Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAE.IT-X.1245 Sup11 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2011-12-21 | ÃÑ ÆäÀÌÁö | 28 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | VoIP ½ºÆÔ ´ëÀÀÀ» À§ÇÑ RBL ÇÁ·¹ÀÓ¿öÅ© | ||||||||||||||||
¿µ¹® Ç¥Áظí | Framework Based on Real-time Blocking List(RBL) for Countering VoIP Spam | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â VoIP ½ºÆÔÀÌ ÀÏ¹Ý e-mail ½ºÆÔ°ú ´Ù¸¥ Ư¡À» ¼³¸íÇϰí, VoIP¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â À§ÇùÀ» µµÃâÇÑ´Ù. ±×¸®°í, À̸¦ À§ÇÑ ´ëÀÀÃ¥À¸·Î ½Ç½Ã°£ ºí·ÎÅ· ¸®½ºÆ® ±â¹ÝÀÇ VoIP ½ºÆÔ ´ëÀÀ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦½ÃÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This standard describes the difference between the VoIP spam and e-mail spam, and also reviewers the threat of VoIP spam. And this standard provides the RBL-based framework for countering VoIP spam. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|