Results 41 to 50 of about 410,715 (365)
A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some less known SIP features by using the IP-spoofing technique, the reflection based attack logic and the DDoS attack logic.
I. Melih Tas +2 more
doaj +1 more source
Enhanced Multiple Speakers’ Separation and Identification for VOIP Applications Using Deep Learning
Institutions have been adopting work/study-from-home programs since the pandemic began. They primarily utilise Voice over Internet Protocol (VoIP) software to perform online meetings. This research introduces a new method to enhance VoIP calls experience
Amira A. Mohamed +2 more
doaj +1 more source
Closed-Circuit Unobservable Voice over IP [PDF]
Among all the security issues in Voice over IP (VoIP) communications, one of the most difficult to achieve is traffic analysis resistance. Indeed, classical approaches provide a reasonable degree of security but induce large round-trip times that are incompatible with VoIP. In this paper, we describe some of the privacy and security issues derived from
Aguilar Melchor, Carlos +2 more
openaire +2 more sources
9-1-1 Calls for Voice-over-IP [PDF]
This document enumerates some of the major opportunities and challenges for providing emergency call (9-1-1) services using IP technology. In particular, all VoIP devices are effectively mobile. The same IP telephony device works anywhere in the Internet,
Schulzrinne, Henning G.
core +2 more sources
Utilizing Voip Packet Header’s Fields to Save the Bandwidth
Voice over IP (VoIP) is widely utilized by organizations, schools, colleges, and so on. Nevertheless, VoIP numerous challenges that hinder its spread.
Abualhaj Mosleh M. +2 more
doaj +1 more source
The implications of ambimorphic archetypes have been far-reaching and pervasive. After years of natural research into consistent hashing, we argue the simulation of public-private key pairs, which embodies the confirmed principles of theory. Such a hypothesis might seem perverse but is derived from known results.
Anggi Cecilia Safaningrum +2 more
openaire +2 more sources
Feasibility of Voice over IP on the Internet [PDF]
VoIP (Voice over IP) services are using the Internet infrastructure to enable new forms of communication and collaboration. A growing number of VoIP service providers such as Skype, Vonage, Broadvoice, as well as many cable services are using the ...
Freund, Yoav, Nieh, Jason, Sherman, Alex
core +2 more sources
Insights Into the Antigenic Repertoire of Unclassified Synaptic Antibodies
ABSTRACT Objective We sought to characterize the sixth most common finding in our neuroimmunological laboratory practice (tissue assay‐observed unclassified neural antibodies [UNAs]), combining protein microarray and phage immunoprecipitation sequencing (PhIP‐Seq). Methods Patient specimens (258; 133 serums; 125 CSF) meeting UNA criteria were profiled;
Michael Gilligan +22 more
wiley +1 more source
Aiming at the special communication network service system, in order to transmit 1 channel of standard G.729 Voice over Internet Protocol(VoIP)voice data over 10 kb/s narrowband channel in the special communication scenario, a hybrid speech compression ...
Li Lingyun +4 more
doaj +1 more source
Synthesizing 802.11B and Voice-over-IP Using Claps [PDF]
Many security experts would agree that, had it not been for gigabit switches, the study of object-oriented languages might never have oc- curred. We omit a more thorough discussion for anonymity.
Forrest, M. (Martin) +3 more
core

