Results 61 to 70 of about 51,627 (217)
The heterogeneity of the network at the edge creates unequal bandwidth availability for clients connected through diverse networks and devices. This variability can lead to bandwidth fluctuations and slow response times, resulting in buffering or degraded streaming performance.
Reza Kalan +3 more
wiley +1 more source
VoIP Steganography Methods, a Survey
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other
Deepikaa S., Saravanan R.
doaj +1 more source
Leveraging Gaussian Attention for Adapter‐Based Fine‐Tuning of WavLM in Audio Deepfake Detection
The advancement of deepfake technology has enabled deepfake audio to achieve unprecedented realism, posing significant challenges to automatic speaker verification (ASV) systems and threatening information security in critical sectors such as telecommunications and banking.
Yuhan Wang +4 more
wiley +1 more source
A Black Box Analysis of Webrtc Mouth-To-Ear Delays
Due to the recent shift toward cloud based computing, some of the world's leading standardization bodies have combined forces to provide guidelines and standards for native implementation of RealTime Communication (RTC) in the browsers.
Oliwia Komperda +2 more
doaj +1 more source
Interviews via VoIP: benefits and disadvantages within a PhD study of SMEs [PDF]
The benefits and disadvantages of Voice over Internet Protocol (VoIP) are explored as part of a PhD study to conduct qualitative interviews to discuss risk management within records management.
Hay-Gibson, Naomi
core
Reliable and secure routing is required in mission‐critical wireless sensor networks (MC‐WSNs), but currently trust‐based protocols such as ATRP are limited by their inability to adapt effectively to attack intensity and their fixed trust weighting.
Omar Ibrahim Mustafa +3 more
wiley +1 more source
Voz IP seguras implementadas en Redes Definidas por Software
Hablar sobre las redes definidas por software, es un paradigma, son más agiles, escalables y dinámicas, para un mejor aumento de programación y automatización.
Byron Oviedo-Bayas +3 more
doaj
Perkembangan teknologi informasi dan komunikasi yang semakin maju, didukung dengan jaringan internet yang semakin sering digunakan dalam kehidupan sehari-hari serta pentingnya komunikasi dalam sebuah lingkungan pemerintahan, maka dalam penelitian ini ...
Maftufin Exsan, Umi Fadlilah
doaj +1 more source
Optimizing Service Differentiation Scheme with Sized-based Queue Management in DiffServ Networks [PDF]
In this paper we introduced Modified Sized-based Queue Management as a dropping scheme that aims to fairly prioritize and allocate more service to VoIP traffic over bulk data like FTP as the former one usually has small packet size with less impact to ...
Madi, Nadim K. M., Othman, Mohamed
core +1 more source
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson +3 more
core +1 more source

