Security on Voice over Internet Protocol from Spoofing Attacks

Neha Kapoor, Yash Kumar, Mona Sharma

Abstract


The network components gateways, call processors and two of the more mutualdesignsapprehended by VoIP.

Keywords


Security; Voice over; Internet Protocol; Spoofing Attacks

Full Text:

PDF




Copyright (c) 2014 Neha Kapoor, Yash Kumar, Mona Sharma

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org