Optimizing Real-Time MI-BCI Performance in Post-Stroke Patients: Impact of Time Window Duration on Classification Accuracy and Responsiveness. [PDF]
Miladinović A +4 more
europepmc +1 more source
An Adaptive Application-Aware Dynamic Load Balancing Framework for Open-Source SD-WAN. [PDF]
Petrović T +4 more
europepmc +1 more source
HOME protocol for a national online survey of people who inject drugs. [PDF]
Luhur WE +9 more
europepmc +1 more source
Few-shot traffic classification based on autoencoder and deep graph convolutional networks. [PDF]
Xu S, Han J, Liu Y, Liu H, Bai Y.
europepmc +1 more source
Related searches:
RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network
IEEE Transactions on Information Forensics and Security, 2018Quantization index modulation (QIM) steganography makes it possible to hide secret information in voice-over IP (VoIP) streams, which could be utilized by unauthorized entities to set up covert channels for malicious purposes.
Zinan Lin, Yong-Feng Huang
exaly +2 more sources
A payload-dependent packet rearranging covert channel for mobile VoIP traffic
Information Sciences, 2018Xianmin Wang +2 more
exaly +2 more sources
QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method
2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), 2022This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme.
Erryc Darmawan +2 more
semanticscholar +1 more source
To VoIP or not to VoIP, is this really the question now?
Computer Communications, 2008Voice over internet protocol (VoIP) based telephony has been around for few years, but it is only owing to the widespread availability of broadband access, presence of multitude of VoIP service providers and the appearance of inexpensive VoIP gateway adapters that this technology became interesting for the mainstream academic users, especially those ...
Marinovic Darko +5 more
openaire +3 more sources
Perseus on VoIP: Development and implementation of VoIP platforms
2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2014Nowadays, voice over IP (VoIP) is rapidly replacing standard phone line as a telephony service of choices. However, VoIP can be exploited by an attacker using method such as eavesdropping, hijacking and etc. To ensure confidentiality and integrity of the conversation or messages sent in the network, a more secure protocol is needed.
Eric Filiol +2 more
openaire +2 more sources

