Author:
Arif Muhammad,Habib Muhammad Asif,Mahmood Nasir,Tariq Asadullah,Ahmad Mudassar
Publisher
Springer Nature Singapore
Reference24 articles.
1. Nur Zincir-Heywood RAA (2015) Identification of VoIP encrypted traffic using a machine learning approach. J King Saud Univ–Comput Inf Sci 27
2. Snader JC (2015) VPNs illustrated: tunnels, VPNs, and IPsec: Addison-Wesley Professional
3. Verthein W, Taarud J, Little W, Telematics E, Zorn G (1999) Point-to-point tunneling protocol (PPTP) status of this memo this memo provides information for the internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited
4. Zorn G, Townsley WM, Rubens A, Palter B, Pall GS, Valencia AJ (1999) Layer two tunneling protocol. L2TP
5. Patel B, Aboba B, Dixon W, Zorn G, Booth S (2001) Securing L2TP using IPsec, 2070–1721