Fig. 3From: Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacksDetailed diagram of CI processingBack to article page