Securing softswitches from malicious attacks

Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication an...

Full description

Bibliographic Details
Main Author: Opie, Jake Weyman
Format: Others
Language:English
Published: Rhodes University 2007
Subjects:
Online Access:http://hdl.handle.net/10962/d1007714