Author:
Yesuf Ahmed Seid,Serna-Olvera Jetzabel,Rannenberg Kai
Publisher
Springer International Publishing
Reference19 articles.
1. Zuccato, A., Daniels, N., Jampathom, C.: Service security requirement profiles for telecom: how software engineers may tackle security. In: Sixth International Conference on Availability, Reliability and Security. IEEE (2011)
2. Rebahi, Y., Nassar, M., Magedanz, T., Festor, O.: A survey on fraud and service misuse in voice over IP (VoIP) networks. Inf. Secur. Tech. Rep. 16(1), 12–19 (2011)
3. CFCA: Global telecom fraud report. Technical report, Communications Fraud Control Association (2000–2015)
4. Yesuf, A.S.: A review of risk identification approaches in the telecommunication domain. In: The 3rd International Conference on Information Systems Security and Privacy, ICISSP (2017)
5. Lecture Notes in Business Information Processing;AS Yesuf,2017
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献