Results 71 to 80 of about 27,518 (233)

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

open access: yesInternational Journal of Telerehabilitation, 2011
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy.  In this
Valerie J.M. Watzlaf   +3 more
doaj   +1 more source

Voice Over Internet Protocol Based Communication Design (VoIP) with 3CXSystemPhone on Android Smartphone [PDF]

open access: yes, 2018
TCP\IP protocol can be connected to various computer data networks in the world. This protocol increasingly exists and is needed so that many parties develop it to vote through this protocol.
Hermawan, A. (Aditiya)   +2 more
core  

Probabilistic classification of quality of service in wireless computer networks [PDF]

open access: yes, 2018
There is an increasing reliance on wireless computer networks for communicating various types of time sensitive applications such as voice over internet protocol (VoIP). Quality of service (QoS) can play an important role in wireless computer networks as
Chorppath   +24 more
core   +1 more source

MEMBANGUN VOICE OVER INTERNET PROTOCOL (VOIP) MENGGUNAKAN SOFTWARE ASTERISK

open access: yesJurnal Teknik, 2017
Voice OverInternetProtocol(VoIP) merupakan terobosan baru dibidang telekomunikasiyang mengusung teknologiIP(internetprotocol)sebagaimedia penghantaraninformasi.Iniberarti,informasiyang berupasuara(sinyalanalog)akan dirubah menjadisinyaldigitaluntukdapatdilewatkan jaringanIP.
openaire   +2 more sources

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

An Efficient Mutual Authentication and Fractional Lyrebird Optimization With Deep Learning–Based SIP‐Based DRDoS Attack Detection

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
Over the past decades, Session Initiation Protocol (SIP) has been commonly utilized in signaling protocol to control and signal multimedia communication sessions for providing various services to users. Video calls and internet telephony over Internet Protocol (IP) are the most common applications on SIP.
V. Sreenivasulu   +2 more
wiley   +1 more source

Analisa Kinerja VoIP Client dengan Menggunakan Modul RTP Terenkripsi dan SRTP pada Jaringan VoIP [PDF]

open access: yes, 2014
Seiring dengan berkembangnya teknologi telekomunikasi dan komputer, banyak aplikasi-aplikasi yang mendukung komunikasi telepon melalui jaringan internet tumbuh dan berkembang.
Prastiawan, H. (Hendra)
core  

A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
As the ability to circumvent internet censorship, encrypted proxies are widely used by criminals in illegal activities (e.g., online gambling and darknet transactions). Thus, detection of encrypted proxy traffic is important. In recent years, deep learning‐based approaches have become mainstream approaches. Many deep learning‐based approaches transform
Yanjie He, Wei Li, Vincenzo Conti
wiley   +1 more source

VOIP Transmission Quality Increase using Adaptive Play-Out Buffer

open access: yesCommunications, 2003
In this paper we consider some quality aspects of VoIP (Voice over Internet Protocol) transmission. We try to increase the voice transmission quality using the adaptive play-out buffer instead of common buffer at the receiver's side.
Marek Repcik
doaj   +1 more source

Home - About - Disclaimer - Privacy