Results 51 to 60 of about 1,370 (185)

Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

open access: yesJournal of Digital Forensics, Security and Law, 2012
The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet.
David Irwin, arek dadej, jill slay
doaj  

A neuro‐evolutionary approach for software defined wireless network traffic classification

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper takes a Software‐Defined Wireless Network (SDWN) architecture for network traffic classification into account. The proposed system uses optimization methods and semi‐supervised machine learning to accurately classify traffic while minimizing communication overhead between the controller and the SDWN switches.
Buddhadeb Pradhan   +5 more
wiley   +1 more source

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

ENHANCEMENT OF VoIP PERFROMANCE IN MANET USING FUZZY LOGIC

open access: yesInternational Journal of Advances in Signal and Image Sciences, 2020
Voiceover Internet Protocol (VoIP) application is a vital technology that is quickly growing in the Mobile Ad hoc NETwork (MANET). Packet loss is a factor that can significantly affect the Quality of Service (QoS) for VoIP performance. Due to the dynamic
Abdusalam Yahya   +1 more
doaj   +1 more source

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

E-model MOS Estimate Improvement through Jitter Buffer Packet Loss Modelling

open access: yesAdvances in Electrical and Electronic Engineering, 2011
Proposed article analyses dependence of MOS as a voice call quality (QoS) measure estimated through ITU-T E-model under real network conditions with jitter. In this paper, a method of jitter effect is proposed.
Adrian Kovac   +3 more
doaj   +1 more source

ANALISA KUALITAS LAYANAN APLIKASI VOIP DAN IMPLEMENTASI PENGGUNAAN LINUX ZENTYAL SEBAGAI PENYEDIA LAYANAN VOIP

open access: yesKomputika, 2021
Voice over Internet Protocol (juga disebut VoIP, IP Telephony, Internet telephony atau Digital Phone) adalah teknologi yang memungkinkan percakapan suara jarak jauh melalui media internet.
Susmini Indriani Lestariningati
doaj  

Analysis of packet switching in VoIP telephony at the command post of tactical level units

open access: yesVojnotehnički Glasnik
Introduction/purpose: This paper conducts a comprehensive analysis of a potential implementation of Voice over Internet Protocol (VoIP) systems, focusing on network architecture, VoIP phones, and servers.
Marko R. Marković   +2 more
doaj   +1 more source

Efficiency of Supervised Machine Learning Algorithms in Regular and Encrypted VoIP Classification within NFV Environment [PDF]

open access: yesRadioengineering, 2020
Cloudification of all computing environments is an undergoing process. The process has overpassed the classical Virtual Machines (VM) and Software-Defined Networking (SDN) approach and has moved towards dockerizing, microservices, app functions, network ...
G. Ilievski, P. Latkoski
doaj  

Home - About - Disclaimer - Privacy