Subject
Computer Networks and Communications
Reference51 articles.
1. S. Garfinkel, VoIP and Skype security, March 2005. URL .
2. A. Godber, P. Dasgupta, Secure wireless gateway, in: Proceedings of the Third ACM Workshop on Wireless Security, ACM Press, New York, NY, USA, 2002, pp. 41–46.
3. E. Barrantes, D. Ackley, T. Palmer, D. Stefanovic, D.D. Zovi, Randomized instruction set emulation to disrupt binary code injection attacks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2003, pp. 281–289.
4. Identifying enterprise network vulnerabilities;Myerson;International Journal of Network Management,2002
5. Challenges in securing voice over IP;Walsh;IEEE Security and Privacy,2005
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献