VoIP protection techniques
This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area. |
---|---|
ISSN: | 1334-2630 |