Results 41 to 50 of about 578 (137)
Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning
This research presents a novel approach for real‐time encrypted traffic classification (ETC) in programmable switches. By leveraging tree‐based machine learning models and P4 programmability, the proposed solution achieves high accuracy (up to 95%) for QUIC traffic classification with minimal overhead, demonstrating its potential for practical ...
Aristide Tanyi‐Jong Akem+2 more
wiley +1 more source
MVF: A Novel Technique to Reduce the Voip Packet Payload Length
The adoption of the Voice over Internet Protocol (VoIP) system is growing due to several factors, including its meagre rate and the numerous contours that can be joined with VoIP systems.
Abualhaj Mosleh M.+3 more
doaj +1 more source
Development and Performance Analysis of a Lossless Data Reduction Algorithm for VoIP [PDF]
VoIP (Voice Over IP) is becoming an alternative way of voice communications over the Internet. To better utilize voice call bandwidth, some standard compression algorithms are applied in VoIP systems.
Syed Misbahuddin, Noureddine Boulejfen
doaj
A neuro‐evolutionary approach for software defined wireless network traffic classification
This paper takes a Software‐Defined Wireless Network (SDWN) architecture for network traffic classification into account. The proposed system uses optimization methods and semi‐supervised machine learning to accurately classify traffic while minimizing communication overhead between the controller and the SDWN switches.
Buddhadeb Pradhan+5 more
wiley +1 more source
An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink
An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-
Kim Yong-Seok
doaj +2 more sources
Audio steganalysis using multi‐scale feature fusion‐based attention neural network
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley +1 more source
EVALUASI INFRASTRUKTUR VOIP PADA NETWORK JARINGAN SOHO
VOIP merupakan bentuk perkembangan komunikasi yang digunakan oleh beberapa perusahaan. Keuntungan mengimplementasikan VOIP mampu memberikan proses komunikasi yang lebih efisien.
Dandy Pramana Hostiadi
doaj
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia+5 more
wiley +1 more source
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim+3 more
wiley +1 more source
VoIP Steganography Methods, a Survey
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other
Deepikaa S., Saravanan R.
doaj +1 more source