Results 41 to 50 of about 59,048 (264)

Development and Performance Analysis of a Lossless Data Reduction Algorithm for VoIP [PDF]

open access: yesMehran University Research Journal of Engineering and Technology, 2014
VoIP (Voice Over IP) is becoming an alternative way of voice communications over the Internet. To better utilize voice call bandwidth, some standard compression algorithms are applied in VoIP systems.
Syed Misbahuddin, Noureddine Boulejfen
doaj  

Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]

open access: yes, 2008
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid   +5 more
core  

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

open access: yesEURASIP Journal on Wireless Communications and Networking, 2008
An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-
Kim Yong-Seok
doaj   +2 more sources

The voice activity detection (VAD) recorder and VAD network recorder : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Computer Science at Massey University [PDF]

open access: yes, 2001
The project is to provide a feasibility study for the AudioGraph tool, focusing on two application areas: the VAD (voice activity detector) recorder and the VAD network recorder.
Liu, Feng
core  

Non-Repudiation in Internet Telephony

open access: yes, 2007
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication.
Hett, Christian   +2 more
core   +1 more source

EVALUASI INFRASTRUKTUR VOIP PADA NETWORK JARINGAN SOHO

open access: yesJurnal Eksplora Informatika, 2018
VOIP merupakan bentuk perkembangan komunikasi yang digunakan oleh beberapa perusahaan. Keuntungan mengimplementasikan VOIP mampu memberikan proses komunikasi yang lebih efisien.
Dandy Pramana Hostiadi
doaj  

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This research presents a novel approach for real‐time encrypted traffic classification (ETC) in programmable switches. By leveraging tree‐based machine learning models and P4 programmability, the proposed solution achieves high accuracy (up to 95%) for QUIC traffic classification with minimal overhead, demonstrating its potential for practical ...
Aristide Tanyi‐Jong Akem   +2 more
wiley   +1 more source

VoIP Steganography Methods, a Survey

open access: yesCybernetics and Information Technologies, 2019
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other
Deepikaa S., Saravanan R.
doaj   +1 more source

Home - About - Disclaimer - Privacy