In this project I simulated a caller that would attack a SIP server with DDOS
The research paper where they didn't give me the credit
https://www.ijitee.org/wp-content/uploads/papers/v8i6s3/F10490486S319.pdf
In this project I simulated a caller that would attack a SIP server with DDOS
The research paper where they didn't give me the credit
https://www.ijitee.org/wp-content/uploads/papers/v8i6s3/F10490486S319.pdf