Results 41 to 50 of about 578 (137)

Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This research presents a novel approach for real‐time encrypted traffic classification (ETC) in programmable switches. By leveraging tree‐based machine learning models and P4 programmability, the proposed solution achieves high accuracy (up to 95%) for QUIC traffic classification with minimal overhead, demonstrating its potential for practical ...
Aristide Tanyi‐Jong Akem   +2 more
wiley   +1 more source

MVF: A Novel Technique to Reduce the Voip Packet Payload Length

open access: yesTransport and Telecommunication
The adoption of the Voice over Internet Protocol (VoIP) system is growing due to several factors, including its meagre rate and the numerous contours that can be joined with VoIP systems.
Abualhaj Mosleh M.   +3 more
doaj   +1 more source

Development and Performance Analysis of a Lossless Data Reduction Algorithm for VoIP [PDF]

open access: yesMehran University Research Journal of Engineering and Technology, 2014
VoIP (Voice Over IP) is becoming an alternative way of voice communications over the Internet. To better utilize voice call bandwidth, some standard compression algorithms are applied in VoIP systems.
Syed Misbahuddin, Noureddine Boulejfen
doaj  

A neuro‐evolutionary approach for software defined wireless network traffic classification

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper takes a Software‐Defined Wireless Network (SDWN) architecture for network traffic classification into account. The proposed system uses optimization methods and semi‐supervised machine learning to accurately classify traffic while minimizing communication overhead between the controller and the SDWN switches.
Buddhadeb Pradhan   +5 more
wiley   +1 more source

An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

open access: yesEURASIP Journal on Wireless Communications and Networking, 2008
An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-
Kim Yong-Seok
doaj   +2 more sources

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

EVALUASI INFRASTRUKTUR VOIP PADA NETWORK JARINGAN SOHO

open access: yesJurnal Eksplora Informatika, 2018
VOIP merupakan bentuk perkembangan komunikasi yang digunakan oleh beberapa perusahaan. Keuntungan mengimplementasikan VOIP mampu memberikan proses komunikasi yang lebih efisien.
Dandy Pramana Hostiadi
doaj  

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

VoIP Steganography Methods, a Survey

open access: yesCybernetics and Information Technologies, 2019
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other
Deepikaa S., Saravanan R.
doaj   +1 more source

Home - About - Disclaimer - Privacy