Results 71 to 80 of about 27,518 (233)
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia +5 more
wiley +1 more source
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this
Valerie J.M. Watzlaf +3 more
doaj +1 more source
Voice Over Internet Protocol Based Communication Design (VoIP) with 3CXSystemPhone on Android Smartphone [PDF]
TCP\IP protocol can be connected to various computer data networks in the world. This protocol increasingly exists and is needed so that many parties develop it to vote through this protocol.
Hermawan, A. (Aditiya) +2 more
core
Probabilistic classification of quality of service in wireless computer networks [PDF]
There is an increasing reliance on wireless computer networks for communicating various types of time sensitive applications such as voice over internet protocol (VoIP). Quality of service (QoS) can play an important role in wireless computer networks as
Chorppath +24 more
core +1 more source
MEMBANGUN VOICE OVER INTERNET PROTOCOL (VOIP) MENGGUNAKAN SOFTWARE ASTERISK
Voice OverInternetProtocol(VoIP) merupakan terobosan baru dibidang telekomunikasiyang mengusung teknologiIP(internetprotocol)sebagaimedia penghantaraninformasi.Iniberarti,informasiyang berupasuara(sinyalanalog)akan dirubah menjadisinyaldigitaluntukdapatdilewatkan jaringanIP.
openaire +2 more sources
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim +3 more
wiley +1 more source
Over the past decades, Session Initiation Protocol (SIP) has been commonly utilized in signaling protocol to control and signal multimedia communication sessions for providing various services to users. Video calls and internet telephony over Internet Protocol (IP) are the most common applications on SIP.
V. Sreenivasulu +2 more
wiley +1 more source
Analisa Kinerja VoIP Client dengan Menggunakan Modul RTP Terenkripsi dan SRTP pada Jaringan VoIP [PDF]
Seiring dengan berkembangnya teknologi telekomunikasi dan komputer, banyak aplikasi-aplikasi yang mendukung komunikasi telepon melalui jaringan internet tumbuh dan berkembang.
Prastiawan, H. (Hendra)
core
A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection
As the ability to circumvent internet censorship, encrypted proxies are widely used by criminals in illegal activities (e.g., online gambling and darknet transactions). Thus, detection of encrypted proxy traffic is important. In recent years, deep learning‐based approaches have become mainstream approaches. Many deep learning‐based approaches transform
Yanjie He, Wei Li, Vincenzo Conti
wiley +1 more source
VOIP Transmission Quality Increase using Adaptive Play-Out Buffer
In this paper we consider some quality aspects of VoIP (Voice over Internet Protocol) transmission. We try to increase the voice transmission quality using the adaptive play-out buffer instead of common buffer at the receiver's side.
Marek Repcik
doaj +1 more source

