Results 221 to 230 of about 76,170 (304)

An Adaptive Application-Aware Dynamic Load Balancing Framework for Open-Source SD-WAN. [PDF]

open access: yesSensors (Basel)
Petrović T   +4 more
europepmc   +1 more source

HOME protocol for a national online survey of people who inject drugs. [PDF]

open access: yesHarm Reduct J
Luhur WE   +9 more
europepmc   +1 more source

RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network

IEEE Transactions on Information Forensics and Security, 2018
Quantization index modulation (QIM) steganography makes it possible to hide secret information in voice-over IP (VoIP) streams, which could be utilized by unauthorized entities to set up covert channels for malicious purposes.
Zinan Lin, Yong-Feng Huang
exaly   +2 more sources

A payload-dependent packet rearranging covert channel for mobile VoIP traffic

Information Sciences, 2018
Xianmin Wang   +2 more
exaly   +2 more sources

QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method

2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), 2022
This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme.
Erryc Darmawan   +2 more
semanticscholar   +1 more source

To VoIP or not to VoIP, is this really the question now?

Computer Communications, 2008
Voice over internet protocol (VoIP) based telephony has been around for few years, but it is only owing to the widespread availability of broadband access, presence of multitude of VoIP service providers and the appearance of inexpensive VoIP gateway adapters that this technology became interesting for the mainstream academic users, especially those ...
Marinovic Darko   +5 more
openaire   +3 more sources

Perseus on VoIP: Development and implementation of VoIP platforms

2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2014
Nowadays, voice over IP (VoIP) is rapidly replacing standard phone line as a telephony service of choices. However, VoIP can be exploited by an attacker using method such as eavesdropping, hijacking and etc. To ensure confidentiality and integrity of the conversation or messages sent in the network, a more secure protocol is needed.
Eric Filiol   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy