[1]
“Using IP-telephony in network infrastructure and peculiarities of its protection from intruders”, RADAP, no. 55, pp. 135–142, Dec. 2013, doi: 10.20535/RADAP.2013.55.135-142.