Results 91 to 100 of about 51,651 (214)

Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM

open access: yesJournal of Digital Forensics, Security and Law, 2011
The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global
david irwin   +3 more
doaj  

实施VoIP过程中的安全性考虑

open access: yesGuangtongxin yanjiu, 2006
随着VoIP(Voice over IP)技术在全球电信市场的不断普及,VoIP的安全问题迫切需要得到解决,而这也是运营商开展业务的前提。VoIP安全可以分为业务的正常提供、业务内容的保密、呼叫者身份确认和系统安全等。文章分析了VoIP目前存在的安全威胁及其相应的防范措施。
姚明辉
doaj  

VoIP语音时延的分析和研究

open access: yesGuangtongxin yanjiu, 2007
文章介绍了VoIP(IP网络上传送语音)语音质量的测试方法,分析了影响VoIP语音质量的主要因素:延迟、抖动、丢包率和时延。利用E模型定量地分析了语音质量与端到端时延的关系,通过建立数学模型,指出了VoIP系统中主要的时延分量,并研究了这些时延分量产生的机理和影响它们的参数。在设计实际的VoIP系统时,可以通过优化影响时延分量的主要参数,改善VoIP系统的时延。
徐勋业, 熊中柱, 王志军
doaj  

A Path-Priority Based Relay Selection Algorithm for VoIP

open access: yesDianxin kexue, 2014
When routing the end-to-end path in the overlay network for VoIP service, it is necessary to ensure the path delay less than 150 ms. Due to the triangle inequality variations existed generally in the overlay network, the current research focus on ...
Hua Qu   +3 more
doaj  

Estudio comparativo de la utilización de ancho de banda con los protocolos SIP e IAX

open access: yesTecnura, 2012
Within the VoIP networks environment, there are three protocols that solve the problem of voice packet signaling, known as “highlight protocols”: H323, SIP and IAX.
Octavio Salcedo   +2 more
doaj  

Towards a Smart Environment: Optimization of WLAN Technologies to Enable Concurrent Smart Services. [PDF]

open access: yesSensors (Basel), 2023
Ali AM   +8 more
europepmc   +1 more source

Securing Session Initiation Protocol. [PDF]

open access: yesSensors (Basel), 2022
Younes O, Albalawi U.
europepmc   +1 more source

Home - About - Disclaimer - Privacy