Article,

Exploiting IP telephony with silence suppression for hidden data transfers.

, , , , and .
Comput. Secur., (2018)

Meta data

Tags

Users

  • @dblp

Comments and Reviews