Results 41 to 50 of about 10,303 (222)
Evaluation of the firewall influence on the session initiation by the SIP multimedia protocol
Firewalls is one of the major components to provide network security. By using firewalls, you can solve such problems as preventing unauthorized access, and deleting, modifying and/or distributing information under protection.
Anatoly Y. Botvinko +1 more
doaj +1 more source
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson +3 more
core +1 more source
Abstract Background and Aims Psychedelic drugs may help treat alcohol use disorder (AUD). This study evaluated BPL‐003, a novel intranasal powder formulation of 5‐methoxy‐N,N‐dimethyltryptamine (5‐MeO‐DMT) benzoate salt, in people with moderate–severe AUD enrolled in a standard of care, 10‐week programme of relapse‐prevention oriented Cognitive ...
John Marsden +10 more
wiley +1 more source
Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications [PDF]
A suitable key agreement protocol plays an essential role in protecting the communications over open channels among users using Voice over Internet Protocol (VoIP).
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core +1 more source
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma +4 more
wiley +1 more source
A Survey of Open Source Products for Building a SIP Communication Platform
The Session Initiation Protocol (SIP) is a multimedia signalling protocol that has evolved into a widely adopted communication standard. The integration of SIP into existing IP networks has fostered IP networks becoming a convergence platform for both ...
Pavel Segec, Tatiana Kovacikova
doaj +1 more source
Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures
Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks.
Christian M. Mueller +4 more
doaj +1 more source
Usage control in SIP-based multimedia delivery [PDF]
The Session Initiation Protocol (SIP) is an application layer signaling protocol for the creation, modification and termination of multimedia sessions and VoIP calls with one or more participants.SIP is widely accepted as the protocol that will dominate ...
Karopoulos, Georgios +2 more
core +1 more source
ABSTRACT Background Advances in genomics have resulted in a rapid expansion of the number of known rare genetic disorders (RGDs). However, the low frequency of RGDs presents a challenge for accurately describing the phenotypic spectrum of a given disorder. Remote phenotyping strategies are uniquely poised to address this knowledge gap.
R. M. Pollak +12 more
wiley +1 more source
Stream Control Transmission Protocol as a Transport for SIP: a case study [PDF]
The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP), as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network.
Giuseppe De Marco +3 more
doaj

