Securing softswitches from malicious attacks
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication an...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Rhodes University
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/10962/d1007714 |