Computer Science ›› 2009, Vol. 36 ›› Issue (5): 108-110.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: This paper proposed a novel model to cope with these attacks such as SETUP flooding, session intercepting, malicious terminating stream media session and RTP assorting in stream media application based on RTSP protocol. The analysis in this paper was disc

Key words: Streaming media,IDS,RTSP, STAT

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!