Research Article

A Secured Load Mitigation and Distribution Scheme for Securing SIP Server

Figure 12

Throughput comparison of two-tier model.