Author of the publication

Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet.

, , , , and . SocialCom/PASSAT, page 1041-1047. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prying Open Pandora's Box: KCI Attacks against TLS., , , and . WOOT, USENIX Association, (2015)Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach., , , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 628-634. Springer, (2013)Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests., , , and . ICST Workshops, page 453-460. IEEE Computer Society, (2013)Black-box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service: work in progress., , , and . IPTComm, page 101-110. ACM, (2010)Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet., , , and . PST, page 205-212. IEEE Computer Society, (2013)A robust and flexible test environment for VoIP security tests., , , and . ICITST, page 1-6. IEEE, (2010)Trapping and analyzing malicious VoIP traffic using a honeynet approach., , , , and . ICITST, page 442-447. IEEE, (2011)Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet., , , , and . SocialCom/PASSAT, page 1041-1047. IEEE Computer Society, (2011)Mining security changes in FreeBSD., , , , and . MSR, page 90-93. IEEE Computer Society, (2010)