Results 251 to 260 of about 76,170 (304)
Some of the next articles are maybe not open access.

VoIP Configurations

2002
Publisher Summary This chapter discusses various voice-supported hardware modules, cabling, tuning, and gateway/gatekeeper configurations with respect to VoIP. The chapter provides examples of some actual configurations for a VoIP network. The chapter elaborates cabling and layout of various types of voice modules in the routers. The chapter discusses
Paul J. Fong   +10 more
openaire   +2 more sources

LB-VoIP: Enhancing access control of VoIP for secure networks

2015 International Telecommunication Networks and Applications Conference (ITNAC), 2015
Voice over IP (VoIP) has attracted the attention of secure networks for its convenient deployment, easy management and multi-service carrying capability. However, security is a big problem that must be considered if VoIP is introduced into secure networks.
Wei Quan   +3 more
openaire   +2 more sources

VoIP MaSe '06 : Securing and managing VoIP communications

2006
VoIP security and ...
State, Radu   +2 more
openaire   +1 more source

The Economics of VoIP Systems

2011
So far, this book has been devoted to developing an understanding of the consumption of bandwidth resources related to VoIP systems. As important as this resource is, numerous other factors determine the price that the VoIP user would pay. This chapter reviews those factors and shows how they influence pricing.
Pramode K. Verma, Ling Wang
openaire   +2 more sources

VOIP voicing concerns

Engineering & Technology, 2011
Channelling voice call over IP networks has brought many advantages to enterprise communications, but it also creates some security risks.
openaire   +2 more sources

VoIP Security

2009
Publisher Summary The Internet has become an important medium for communication, and all kinds of media communications are carried on today's Internet. Telephony over the Internet has received a lot of attention in the last few years because it offers users advantages such as long distance toll bypass, interactive e-commerce, global online customer ...
Dan Wing, Harsh Kupwade Patil
openaire   +2 more sources

VoIP Bots

2014
This chapter describes utilization of the RTP stream as a covert communication channel for exfiltration of data, and command and control of botnets.
Nicholas Grant, Joseph W. Shaw
openaire   +2 more sources

VoIP Technology

2003
Publisher Summary This chapter describes various issues that need to be considered when deploying voice across an Internet Protocol (IP)-based network infrastructure. The implementation of voice over IP (VoIP) requires attention to many factors which, including delay, jitter, packet loss, packet misorder, available bandwidth, packet prioritization ...
Joy Rahman   +2 more
openaire   +2 more sources

VoIP – a call for better protection

Network Security, 2006
IP Telephony or Voice over IP (VoIP) was one of the key technologies of 2005, and will continue to be one of the technologies to watch in 2006. However, as well as introducing opportunities for cost savings and increased flexibility, IP networks also introduce a number of security concerns. What are the security issues surrounding IP networks, and what
openaire   +2 more sources

Fuzzing for vulnerabilities in the VoIP space

2008
Voice over IP is emerging as the key technology in the current and future Internet. This paper shares some essential practical experience gathered over a two years period in searching for vulnerabilities in the VoIP space. We will show a terrifying landscape of the most dangerous vulnerabilities capable to lead to a complete compromise of an internal ...
Abdelnur, Humberto   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy