Publications

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All

Behavior- based approach to detect spam over IP telephony attacks

International Journal of Information Security | 2015

DOI: https://doi.org/10.1007/s10207-015-0281-1