Results 31 to 40 of about 53,786 (213)

IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network

open access: yesCommunications, 2013
The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal ...
Jakub Safarik   +3 more
doaj   +1 more source

Safe communicated model of SIP network based on improved SIP protocol

open access: yesTongxin xuebao, 2007
Through analyzing the security of SIP,combining PKI technology,digital time authentication,digital certifi-cate and the characteristic of SIP network,the safe communicated model of SIP network based on improved SIP protocol was put forward.New call ...
ZHANG Zhao-xin1   +3 more
doaj   +2 more sources

True Cost Accounting and Social Entrepreneurship as Key Factors for a New Food System

open access: yesMercados y Negocios, 2023
The paper aims to understand the problems of the food system, identify the value of food, and the role of social entrepreneurs in changing the status quo.
Irma Cecilia Ortega Moreno   +2 more
doaj   +1 more source

End‐to‐End Sensing Systems for Breast Cancer: From Wearables for Early Detection to Lab‐Based Diagnosis Chips

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane   +4 more
wiley   +1 more source

Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration

open access: yesIEEE Access
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami   +9 more
doaj   +1 more source

Analysis of the Architecture of the Mental Health Education System for College Students Based on the Internet of Things and Privacy Security

open access: yesIEEE Access, 2021
In recent years, the rapid development of computer and network technology has produced various positive and negative effects on the mental health of college students. This also brings challenges to mental health education in colleges.
Ruijian Xiao, Xingeng Liu
doaj   +1 more source

Dependable reconfigurable multi-sensor poles for security [PDF]

open access: yes, 2009
Wireless sensor network poles for security monitoring under harsh environments require a very high dependability as they are safety-critical [1]. An example of a multi-sensor pole is shown.
Kerkhoff, Hans G.
core   +3 more sources

Mechanically Robust Biodegradable Stents With Theragenerative Vascular Responses via Combined 3D Printing and Janus Nanoengineering

open access: yesAdvanced Science, EarlyView.
This work introduces a theragenerative 3D‐printed biodegradable stent with Janus nanoarchitecture for spatially controlled vascular healing. A luminal tantalum ion–implanted surface accelerates endothelialization and hemocompatibility, while an abluminal sirolimus/poly‐L‐lactic acid–tantalum layer provides sustained drug release and suppresses smooth ...
Jong Hwa Seo   +19 more
wiley   +1 more source

A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol

open access: yesApplied Sciences, 2018
Session initiation protocol (SIP) is the most widely used application layer control protocol for creating, modifying, and terminating session processes.
Chien-Ming Chen   +4 more
doaj   +1 more source

A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms

open access: yesIET Communications, 2022
Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth.
Kusum Yadav   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy