Fingerprint
Dive into the research topics of 'Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Yu Han Lu, Sandy Hsin Yu Hsiao, Chi Yu Li, Yi Chen Hsieh, Po Yi Chou, Yao Yu Li, Tian Xie, Guan Hua Tu
Research output: Contribution to journal › Article › peer-review