4.7 Article Data Paper

Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)

Makhdoom Muhammad Naeem et al.

COMPUTER NETWORKS (2020)

Proceedings Paper Computer Science, Theory & Methods

A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network

G. Vennila et al.

PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (2016)