Results 251 to 260 of about 306,057 (287)
Some of the next articles are maybe not open access.
Evaluation of users’ perspective on VOIP’s security vulnerabilities
2011Voice over Internet protocol (VoIP) represents a major newish trend in telecommunications and an alternative to traditional phone systems. VoIP uses IP networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks complicates security issues and introduces a range of vulnerabilities.
Heravi, Alireza, Mubarak, Sameera
openaire +2 more sources
User-Centric Cell-Free Massive MIMO Networks: A Survey of Opportunities, Challenges and Solutions
IEEE Communications Surveys and Tutorials, 2022Hussein A Ammar +2 more
exaly
Deep learning approaches for vulnerable road users safety
Safety Science, 2023Jeon, G +3 more
openaire +2 more sources
Vulnerable Road User Planning and Design
2023Donna Lewandowski, Tyler Grau, Wei Zhu
openaire +1 more source
Commentary: Pedestrians: Truly Vulnerable Road Users
Annals of Emergency Medicine, 2009openaire +2 more sources
User Association in 5G Networks: A Survey and an Outlook
IEEE Communications Surveys and Tutorials, 2016Lifeng Wang, Yue Chen, Maged Elkashlan
exaly

