Author of the publication

On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.

, , , , and . AsiaCCS, page 61-69. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation., and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-121. Springer, (2013)Roving Bugnet: Distributed Surveillance Threat and Mitigation., and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 39-50. Springer, (2009)On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers., , , , and . AsiaCCS, page 61-69. ACM, (2009)An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems., , , , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 59-70. Springer, (2009)CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump., and . ISC, volume 8783 of Lecture Notes in Computer Science, page 502-514. Springer, (2014)VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits., and . NOMS, page 486-489. IEEE, (2012)Effects of Processing Delay on Function-Parallel Firewalls., and . Parallel and Distributed Computing and Networks, page 136-141. IASTED/ACTA Press, (2006)A Function-Parallel Architecture for High-Speed Firewalls., and . ICC, page 2213-2218. IEEE, (2006)