A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are widely deployed technologies since they provide an efficient and fast means of both voice and data communication over a single network.
Ismail Melih Tas, Selcuk Baktir
doaj +3 more sources
Time-Domain ADC and Security Co-Design for SiP-Based Wireless SAW Sensor Readers [PDF]
The signal-processing architecture of passive surface acoustic wave (SAW) sensors presents significant implementation challenges due to its radar-like operational principle and the inherent complexity of discrete component-based hardware design.
Zhen Mao +3 more
doaj +2 more sources
Thermal Side-Channel Threats in Densely Integrated Microarchitectures: A Comprehensive Review for Cyber–Physical System Security [PDF]
Densely integrated microarchitectures spanning three-dimensional integrated circuits (3D-ICs), chiplet-based designs, and system-in-package (SiP) assemblies make heat a first-order security concern rather than a mere reliability issue.
Amrou Zyad Benelhaouare +4 more
doaj +2 more sources
“Our lives matter”: a qualitative examination of the impact of COVID-19 shelter-in-place orders on resource security and mental and physical health of Black and Latino sexual minority men in California and New York [PDF]
The COVID-19 and HIV pandemics have disproportionately affected Black and Latino sexual minority men (BLSMM) in the United States, with them having the highest burden of disease. Despite this disparity, few studies have examined the intersection of COVID-
Orlando O. Harris +8 more
doaj +2 more sources
Securing Session Initiation Protocol
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants.
Osama Younes, Umar Albalawi
doaj +1 more source
Research on Vulnerability Discovery for SIP Based on Protocol Analysis and Fuzz Test [PDF]
Aiming at the potential security vulnerabilities of Session Initiation Protocol(SIP) and the lack of research work for exploiting SIP vulnerabilities,an exploiting solution of SIP vulnerabilities is proposed based on protocol analysis and fuzz test.On ...
LI Jindong,WANG Tao,WU Yang,LEI Dong
doaj +1 more source
One of the most frequently used signaling techniques for initiating, sustaining, and dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are gaining widespread applications in the human-centered Internet of Things (
Chandrashekhar Meshram +3 more
doaj +1 more source
Detection of Abnormal SIP Signaling Patterns: A Deep Learning Comparison
This paper investigates the detection of abnormal sequences of signaling packets purposely generated to perpetuate signaling-based attacks in computer networks. The problem is studied for the Session Initiation Protocol (SIP) using a dataset of signaling
Diogo Pereira, Rodolfo Oliveira
doaj +1 more source
Classification of Abnormal Signaling SIP Dialogs Through Deep Learning
Due to the high utilization of the Session Initiation Protocol (SIP) in the signaling of cellular networks and voice over IP multimedia systems, the avoidance of security vulnerabilities in SIP systems is a major aspect to assure that the operators can ...
Diogo Pereira +2 more
doaj +1 more source
SIP Issues and Challenges – A Scalable Three Factor Authentication Scheme
The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol used for initiating, continuing and terminating multimedia session for the end user.
Saeed Ullah Jan, Fawad Qayum, Ajab Khan
doaj +1 more source

