Introduction This Taxonomy defines the many potential security threats to VoIP deployments, services, and end users. The overall goal is to help drive VoIP security awareness with the press, industry and public. In particular this Taxonomy provides a detailed structure for technical vulnerabilities that informs the following constitutencies: • Press and… (More)
*Names asterisked and listed first indicate primary contributors. iv LIST OF FIGURES Figure 1. Location of study communities in the Upper Yukon-Porcupine region. Table 1. Summary of community demographic characteristics and place names documentation.