Results 41 to 50 of about 852,517 (241)

Rqa based approach to detect and prevent ddos attacks in voip networks

open access: yesCybernetics and Information Technologies, 2014
Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets.
Jeyanthi N.   +2 more
doaj   +1 more source

A New Decentralized Control Strategy of Microgrids in the Internet of Energy Paradigm

open access: yesEnergies, 2021
The Energy Internet paradigm is the evolution of the Internet of Things concept in the power system. Microgrids (MGs), as the essential element in an Energy Internet, are expected to be controlled in a corporative and flexible manner. This paper proposes
Bilal Naji Alhasnawi   +4 more
doaj   +1 more source

Security of internet protocol cameras - A case example [PDF]

open access: yes, 2013
The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of ...
Campbell, William
core   +2 more sources

A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group [PDF]

open access: yes, 1991
The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements ...
Bishop, Matt
core   +2 more sources

Performance evaluation of lightweight and secure protocol for wireless sensor networks: A protocol to enable Web services in IPv6 over low-power wireless personal area networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
The integration of wireless sensor networks within the Internet has been possible with the use of the IPv6 over low-power wireless personal area network standard at lower layers and Web services at higher layers.
Patricia E Figueroa   +2 more
doaj   +1 more source

Security Model for TCP/IP Protocol Suite

open access: yesJournal of Advances in Information Technology, 2011
the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet.  Internet usage continues to increase exponentially.
Anand Kumar, S. Karthikeyan
doaj   +1 more source

Multicast Internet protocol

open access: yesComputer Communications, 2000
In this paper, we first review the existing IPv4 based multicast protocols and identify their shortcomings. We then proposed a new multicast protocol, called Multicast Internet Protocol (MIP), which is both scalable and flexible. The design principle of MIP is fundamentally different from the existing IPv4 based multicast protocols.
WANG, X. K., DENG, Robert H., BAO, Feng
openaire   +3 more sources

Voice Over Internet Protocol Based Communication Design (VoIP) with 3CXSystemPhone on Android Smartphone [PDF]

open access: yes, 2018
TCP\IP protocol can be connected to various computer data networks in the world. This protocol increasingly exists and is needed so that many parties develop it to vote through this protocol.
Hermawan, A. (Aditiya)   +2 more
core  

A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

open access: yesSensors, 2017
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as
Seung-Man Chun, Jong-Tae Park
doaj   +1 more source

Home - About - Disclaimer - Privacy