Publisher
Springer Fachmedien Wiesbaden
Reference29 articles.
1. Aleroud A, Zhou L (2017) Phishing environments, techniques, and countermeasures: a survey. Comput Secur 68:160–196
2. Aziz A, Hoffstadt D, Ganz S, Rathgeb E (2013) Development and analysis of generic VoIP attack sequences based on analysis of real attack traffic. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013). Melbourne, Victoria, Australia: Institute of Electrical and Electronics Engineers (IEEE)
3. Barz HW, Bassett GA (2016) Session Initiation Protocol. Protocols, Design, and Applications. John Wiley & Sons. Chichester, UK Ltd., In Multimedia Networks, S 147–182
4. Benetti S (2020) VoIP und Internet-Telefonie: Die wichtigsten Fragen beantwortet. https://www.haus.de/smart-home/voip-und-internet-telefonie. Zugegriffen: 30. Juli 2020
5. Elsabagh M, Fleck D, Stavrou A, Bowen T (2017) Practical and accurate runtime application protection against DoS attacks. In: International Symposium on Research in Attacks, Intrusions, and Defenses. Springer. Cham, S 450–471