共 22 条
[1]
Ahmed Hussam Alddin S., 2014, International Journal of Digital Content Technology and its Applications, V8, P40
[2]
Alexander AL, 2009, NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, P95, DOI 10.1109/NSS.2009.90
[3]
[Anonymous], 2014, TESTING VOICE IP VOI
[4]
Ashraf M.T., INVESTIGATION EFFECT
[5]
Voice over IPsec: Analysis and solutions
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:261-270
[6]
Security challenge and Defense in VoIP infrastructures
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2007, 37 (06)
:1152-1162
[7]
Coulibaly E, 2010, COMP ENG TECHN ICCET, V3, DOI 10.1109/ICCET.2010.5485790.
[8]
Critelli A., 2014, HACKING VOIP DECRYPT
[9]
Desantis M., 2006, UNDERSTANDING VOICE
[10]
Gedia D, 2018, INF TECHNOL IND, V6, P1