Results 11 to 20 of about 217,910 (328)

Telephony Denial of Service Defense at Data Plane (TDoSD@DP) [PDF]

open access: yes, 2018
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident ...
Febro, Aldo   +2 more
core   +2 more sources

ITSM Strategy Using CSI on ITIL V.3 To Improve IT Services

open access: yesIntensif: Jurnal Ilmiah Penelitian Teknologi dan Penerapan Sistem Informasi, 2020
The SIMBARU (Academic information System) has The obstacles that currently occur in the SIMBARU process is how to utilize an IT-based academic service system that is ready to run/use in the optimal time optimally, providing services with the right target,
Khurotul Aeni, Randi Adzin
doaj   +1 more source

Securing Session Initiation Protocol

open access: yesSensors, 2022
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants.
Osama Younes, Umar Albalawi
doaj   +1 more source

Electronic swallowing intervention package to support swallowing function in patients with head and neck cancer: development and feasibility study [PDF]

open access: yes, 2018
Background: Many patients undergoing treatment for head and neck cancer (HNC) experience significant swallowing difficulties, and there is some evidence that swallowing exercises may improve outcomes, including quality of life.
Boa, Sally   +4 more
core   +2 more sources

Stereotactic Thermal Ablation of Liver Tumors: 3D Planning, Multiple Needle Approach, and Intraprocedural Image Fusion Are the Key to Success—A Narrative Review

open access: yesBiology, 2021
Thermal ablation is an emerging, potentially curative approach in treating primary and metastatic liver cancer. Different technologies are available, with radiofrequency ablation (RFA) and microwave ablation (MWA) being the most widely used.
Gregor Laimer   +2 more
doaj   +1 more source

ALEX: Improving SIP Support in Systems with Multiple Network Addresses [PDF]

open access: yes, 2005
The successful and increasingly adopted session initiation protocol (SIP) does not adequately support hosts with multiple network addresses, such as dual-stack (IPv4-IPv6) or IPv6 multi-homed devices. This paper presents the Address List Extension (ALEX)
Baldi, Mario   +3 more
core   +1 more source

A study of the mechanism for intergenerational transmission of gender roles in single-parent families

open access: yesHeliyon, 2023
The divorce rate in China is rising yearly, and the concept of marriage is changing, triggering many social topics related to single parents. Among them, gender-awareness education for children in single-parent families is particularly worthy of ...
I-Jun Chen, Zisong Chen
doaj   +1 more source

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

SIP protocol model for OMNET++

open access: yesAdvances in Electrical and Electronic Engineering, 2016
The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing.
Jan Kucerak, Petr Chlumsky
doaj   +1 more source

Evaluation of the firewall influence on the session initiation by the SIP multimedia protocol

open access: yesDiscrete and Continuous Models and Applied Computational Science, 2021
Firewalls is one of the major components to provide network security. By using firewalls, you can solve such problems as preventing unauthorized access, and deleting, modifying and/or distributing information under protection.
Anatoly Y. Botvinko   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy