Results 251 to 260 of about 306,057 (287)
Some of the next articles are maybe not open access.

Evaluation of users’ perspective on VOIP’s security vulnerabilities

2011
Voice over Internet protocol (VoIP) represents a major newish trend in telecommunications and an alternative to traditional phone systems. VoIP uses IP networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks complicates security issues and introduces a range of vulnerabilities.
Heravi, Alireza, Mubarak, Sameera
openaire   +2 more sources

User-Centric Cell-Free Massive MIMO Networks: A Survey of Opportunities, Challenges and Solutions

IEEE Communications Surveys and Tutorials, 2022
Hussein A Ammar   +2 more
exaly  

Deep learning approaches for vulnerable road users safety

Safety Science, 2023
Jeon, G   +3 more
openaire   +2 more sources

Vulnerable Road User Planning and Design

2023
Donna Lewandowski, Tyler Grau, Wei Zhu
openaire   +1 more source

The vulnerable road user

Accident Analysis & Prevention, 1992
openaire   +1 more source

User Association in 5G Networks: A Survey and an Outlook

IEEE Communications Surveys and Tutorials, 2016
Lifeng Wang, Yue Chen, Maged Elkashlan
exaly  

Home - About - Disclaimer - Privacy