Login / Signup
VoIP Security: Vulnerabilities, Exploits, and Defenses.
Xinyuan Wang
Ruishan Zhang
Published in:
Adv. Comput. (2011)
Keyphrases
</>
security vulnerabilities
dos attacks
network security
intrusion detection
penetration testing
lightweight
security properties
network architecture
quality of service
low cost
data management
information sharing
software architecture
unauthorized access