Results 31 to 40 of about 53,786 (213)
IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network
The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal ...
Jakub Safarik +3 more
doaj +1 more source
Safe communicated model of SIP network based on improved SIP protocol
Through analyzing the security of SIP,combining PKI technology,digital time authentication,digital certifi-cate and the characteristic of SIP network,the safe communicated model of SIP network based on improved SIP protocol was put forward.New call ...
ZHANG Zhao-xin1 +3 more
doaj +2 more sources
True Cost Accounting and Social Entrepreneurship as Key Factors for a New Food System
The paper aims to understand the problems of the food system, identify the value of food, and the role of social entrepreneurs in changing the status quo.
Irma Cecilia Ortega Moreno +2 more
doaj +1 more source
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane +4 more
wiley +1 more source
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami +9 more
doaj +1 more source
In recent years, the rapid development of computer and network technology has produced various positive and negative effects on the mental health of college students. This also brings challenges to mental health education in colleges.
Ruijian Xiao, Xingeng Liu
doaj +1 more source
Dependable reconfigurable multi-sensor poles for security [PDF]
Wireless sensor network poles for security monitoring under harsh environments require a very high dependability as they are safety-critical [1]. An example of a multi-sensor pole is shown.
Kerkhoff, Hans G.
core +3 more sources
This work introduces a theragenerative 3D‐printed biodegradable stent with Janus nanoarchitecture for spatially controlled vascular healing. A luminal tantalum ion–implanted surface accelerates endothelialization and hemocompatibility, while an abluminal sirolimus/poly‐L‐lactic acid–tantalum layer provides sustained drug release and suppresses smooth ...
Jong Hwa Seo +19 more
wiley +1 more source
A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol
Session initiation protocol (SIP) is the most widely used application layer control protocol for creating, modifying, and terminating session processes.
Chien-Ming Chen +4 more
doaj +1 more source
Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth.
Kusum Yadav +6 more
doaj +1 more source

