Securing softswitches from malicious attacks
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication an...
Main Author: | Opie, Jake Weyman |
---|---|
Format: | Others |
Language: | English |
Published: |
Rhodes University
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/10962/d1007714 |
Similar Items
-
Defending against low-rate TCP attack: dynamic detection and protection.
Published: (2005) -
A comprehensive VoIP system with PSTN connectivity.
Published: (2001) -
System and Methods for Detecting Unwanted Voice Calls
by: Kolan, Prakash
Published: (2007) - Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study
-
Optimization of resources allocation for H.323 endpoints and terminals over VoIP networks
Published: (2014)