For example,Бобцов

Information security protection of IMS on SIP layer

Annotation

The article presents an analysis of models for detection malicious attacks at the level of the session initiation protocol (SIP).The structure of system of protection of the IMS domain, using session border controllers (SBC) is considered.

Keywords

Articles in current issue