Zuzana Bajakova

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The complexity and robustness of the currently used IP telephony infrastructures requires systematic monitoring of the network against security threats, where captured incidents are often used as a source of information for further research and analytical optimization of the monitored topologies. This article presents an analysis of IP telephony security(More)
  • 1