Results 51 to 60 of about 53,786 (213)

Intensive Swallowing Rehabilitation for Head and Neck Cancer Survivors With Chronic Dysphagia: Outcomes From a Prospective Multicentre Cohort Study With 6‐Month Follow‐Up

open access: yesHead &Neck, EarlyView.
ABSTRACT Background Chronic dysphagia persists in some head and neck cancer (HNC) survivors despite preventive exercises, negatively impacting quality of life. Evidence for effective rehabilitation strategies remains limited. Methods This prospective cohort study included 34 HNC survivors (≥ 1 year post‐treatment) who completed a 3‐week intensive ...
J. I. Oldenbeuving   +3 more
wiley   +1 more source

Security middleware for IMS-WLAN interworking

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2013
The 3GPP proposes security architecture for Interworking WLAN-3GPP. However, it presents inefficiencies in the authentication procedure, which bring a greater consumption of radio resources, processing on the devices and delayed authentication.
Oscar Caicedo   +2 more
doaj   +1 more source

SIP threats detection system [PDF]

open access: yes, 2010
The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony.
Vozňák, Miroslav, Řezáč, Filip
core  

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Service Provider Implementation of SIP Regarding Security [PDF]

open access: yes21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
The rapid growth of the SIP implementations clearly shows that the classical PSTN network will be exchanged by Internet telephony. All Service Providers (SP) are currently deploying SIP infrastructure for offering the next generation networks. The implementations and network concepts used by the SP are different then the original designed in SIP ...
Vesselin Tzvetkov, Holger Zuleger
openaire   +1 more source

GOVERNING THE CLOUD: Infrastructural Statecraft and the Political Ecology of Digital Expansion in Oregon

open access: yesInternational Journal of Urban and Regional Research, EarlyView.
Abstract Oregon's wave of data center and semiconductor projects shows how cloud capitalism reorganizes resource systems and territorial governance. Examining Amazon, Google, and Intel, the article traces how fiscal incentives, utility programs, and land‐use instruments are recalibrated to secure hyperscale loads.
Justin Kollar
wiley   +1 more source

A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves

open access: yesJournal of Telecommunications and Information Technology, 2017
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone ...
Asma Jebrane   +3 more
doaj   +1 more source

The Outsiders: Principled Withdrawal, Whiteness, and Power in the Los Angeles Food Justice Movement

open access: yesAmerican Anthropologist, EarlyView.
ABSTRACT This article draws on understandings of whiteness and the misconstrual of South Central Los Angeles to analyze the power dynamics between “outsider” activists and residents of South Central as they worked toward a more equitable food system.
Hanna Garth
wiley   +1 more source

Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

open access: yesAdvances in Electrical and Electronic Engineering, 2011
SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors.
Filip Rezac   +4 more
doaj   +1 more source

SIP registration stress test [PDF]

open access: yes, 2012
This paper deals with a benchmarking of SIP infrastructure and improves the methodology of SIP performance evaluation further to better fit into the design of the SIP testing platform, which is being designed in the VSB – Technical University of ...
Rozhon, Jan, Vozňák, Miroslav
core  

Home - About - Disclaimer - Privacy