Results 51 to 60 of about 53,786 (213)
ABSTRACT Background Chronic dysphagia persists in some head and neck cancer (HNC) survivors despite preventive exercises, negatively impacting quality of life. Evidence for effective rehabilitation strategies remains limited. Methods This prospective cohort study included 34 HNC survivors (≥ 1 year post‐treatment) who completed a 3‐week intensive ...
J. I. Oldenbeuving +3 more
wiley +1 more source
Security middleware for IMS-WLAN interworking
The 3GPP proposes security architecture for Interworking WLAN-3GPP. However, it presents inefficiencies in the authentication procedure, which bring a greater consumption of radio resources, processing on the devices and delayed authentication.
Oscar Caicedo +2 more
doaj +1 more source
SIP threats detection system [PDF]
The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony.
Vozňák, Miroslav, Řezáč, Filip
core
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Service Provider Implementation of SIP Regarding Security [PDF]
The rapid growth of the SIP implementations clearly shows that the classical PSTN network will be exchanged by Internet telephony. All Service Providers (SP) are currently deploying SIP infrastructure for offering the next generation networks. The implementations and network concepts used by the SP are different then the original designed in SIP ...
Vesselin Tzvetkov, Holger Zuleger
openaire +1 more source
Abstract Oregon's wave of data center and semiconductor projects shows how cloud capitalism reorganizes resource systems and territorial governance. Examining Amazon, Google, and Intel, the article traces how fiscal incentives, utility programs, and land‐use instruments are recalibrated to secure hyperscale loads.
Justin Kollar
wiley +1 more source
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone ...
Asma Jebrane +3 more
doaj +1 more source
The Outsiders: Principled Withdrawal, Whiteness, and Power in the Los Angeles Food Justice Movement
ABSTRACT This article draws on understandings of whiteness and the misconstrual of South Central Los Angeles to analyze the power dynamics between “outsider” activists and residents of South Central as they worked toward a more equitable food system.
Hanna Garth
wiley +1 more source
Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements
SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors.
Filip Rezac +4 more
doaj +1 more source
SIP registration stress test [PDF]
This paper deals with a benchmarking of SIP infrastructure and improves the methodology of SIP performance evaluation further to better fit into the design of the SIP testing platform, which is being designed in the VSB – Technical University of ...
Rozhon, Jan, Vozňák, Miroslav
core

