VoIP 보안 취약점 공격에 대한 기존 보안 장비의 대응 분석 연구

The Korea Institute of Information Security and Cryptology, Vol. 17, No. 5, pp. 57-65, 10월. 2007
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Park, H. Paek, Y. Won, C. Im, B. Hwang, "nan," The Korea Institute of Information Security and Cryptology, vol. 17, no. 5, pp. 57-65, 2007.

[ACM Style]
Jin-Bum Park, Hyung-Goo Paek, Yong-Geun Won, Chae-Tae Im, and Byoung-Woo Hwang. 2007. nan. The Korea Institute of Information Security and Cryptology, 17, 5, (2007), 57-65.