Attack Patterns in VoIP. Pelaez J Fernandez E, L., M., &., W., C. In 2007. Proc. 14th Conference on Pattern Languages of Programs (PLoP), Illinois, USA. bibtex @inProceedings{
title = {Attack Patterns in VoIP.},
type = {inProceedings},
year = {2007},
publisher = {Proc. 14th Conference on Pattern Languages of Programs (PLoP), Illinois, USA},
id = {e63a36f2-19cc-3fdf-9c03-8a49173a2575},
created = {2019-11-19T13:01:21.222Z},
file_attached = {false},
profile_id = {bddcf02d-403b-3b06-9def-6d15cc293e20},
group_id = {17585b85-df99-3a34-98c2-c73e593397d7},
last_modified = {2019-11-19T13:47:27.080Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {isg:1170},
source_type = {inproceedings},
private_publication = {false},
bibtype = {inProceedings},
author = {Pelaez J Fernandez E, Larrondo-Petrie M & Wieser C}
}
Downloads: 0
{"_id":"3DqwSwgZtupzpnaMy","bibbaseid":"pelaezjfernandeze-attackpatternsinvoip-2007","authorIDs":[],"author_short":["Pelaez J Fernandez E, L., M., &., W., C."],"bibdata":{"title":"Attack Patterns in VoIP.","type":"inProceedings","year":"2007","publisher":"Proc. 14th Conference on Pattern Languages of Programs (PLoP), Illinois, USA","id":"e63a36f2-19cc-3fdf-9c03-8a49173a2575","created":"2019-11-19T13:01:21.222Z","file_attached":false,"profile_id":"bddcf02d-403b-3b06-9def-6d15cc293e20","group_id":"17585b85-df99-3a34-98c2-c73e593397d7","last_modified":"2019-11-19T13:47:27.080Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"isg:1170","source_type":"inproceedings","private_publication":false,"bibtype":"inProceedings","author":"Pelaez J Fernandez E, Larrondo-Petrie M & Wieser C","bibtex":"@inProceedings{\n title = {Attack Patterns in VoIP.},\n type = {inProceedings},\n year = {2007},\n publisher = {Proc. 14th Conference on Pattern Languages of Programs (PLoP), Illinois, USA},\n id = {e63a36f2-19cc-3fdf-9c03-8a49173a2575},\n created = {2019-11-19T13:01:21.222Z},\n file_attached = {false},\n profile_id = {bddcf02d-403b-3b06-9def-6d15cc293e20},\n group_id = {17585b85-df99-3a34-98c2-c73e593397d7},\n last_modified = {2019-11-19T13:47:27.080Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {isg:1170},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inProceedings},\n author = {Pelaez J Fernandez E, Larrondo-Petrie M & Wieser C}\n}","author_short":["Pelaez J Fernandez E, L., M., &., W., C."],"bibbaseid":"pelaezjfernandeze-attackpatternsinvoip-2007","role":"author","urls":{},"downloads":0},"bibtype":"inProceedings","creationDate":"2019-11-19T13:17:06.569Z","downloads":0,"keywords":[],"search_terms":["attack","patterns","voip","pelaez j fernandez e"],"title":"Attack Patterns in VoIP.","year":2007}