Results 141 to 150 of about 1,370 (185)
Some of the next articles are maybe not open access.

VoIP steganography and its Detection—A survey

ACM Computing Surveys, 2013
Wojciech Mazurczyk
exaly  

Building packet length covert channel over mobile VoIP traffics

Journal of Network and Computer Applications, 2018
Yu-An Tan, Xiaosong Zhang, Xianmin Wang
exaly  

VoIP Configurations

2002
Paul J. Fong   +10 more
openaire   +1 more source

NTP VoIP Test Bed

2005
Q. Wu   +4 more
openaire   +2 more sources

A comprehensive survey on scheduler for VoIP over WLAN

Journal of Network and Computer Applications, 2013
Kashif Nisar   +2 more
exaly  

ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP

IEEE Transactions on Information Forensics and Security, 2020
Paolo Addesso   +2 more
exaly  

Measurement and Analysis of the VoIP Capacity in IEEE 802.11 WLAN

IEEE Transactions on Mobile Computing, 2009
Henning Schulzrinne
exaly  

VoIP Praxisleitfaden

2016
Jörg Fischer, Christian Sailer
openaire   +1 more source

VoIP Security

2011
Xinyuan Wang, Ruishan Zhang
openaire   +1 more source

Home - About - Disclaimer - Privacy