has been cited by the following article(s):
[1]
|
Method of Protection Against Traffic Termination in VoIP
2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI),
2018
DOI:10.1109/ECAI.2018.8678992
|
|
|
[2]
|
Secure voice over internet protocol based on combined secret key method
2016 2nd IEEE International Conference on Computer and Communications (ICCC),
2016
DOI:10.1109/CompComm.2016.7924690
|
|
|
[3]
|
Security analysis of VoIP architecture for identifying SIP vulnerabilities
2014 International Conference on Emerging Technologies (ICET),
2014
DOI:10.1109/ICET.2014.7021022
|
|
|