Computer Science ›› 2009, Vol. 36 ›› Issue (5): 108-110.
Previous Articles Next Articles
Online:
Published:
Abstract: This paper proposed a novel model to cope with these attacks such as SETUP flooding, session intercepting, malicious terminating stream media session and RTP assorting in stream media application based on RTSP protocol. The analysis in this paper was disc
Key words: Streaming media,IDS,RTSP, STAT
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I5/108
Cited