Results 61 to 70 of about 51,627 (217)

Secure Live Streaming: Implementing Security in Adaptive Video Streaming via Watermarking Techniques While Preserving Quality

open access: yesInternational Journal of Digital Multimedia Broadcasting, Volume 2026, Issue 1, 2026.
The heterogeneity of the network at the edge creates unequal bandwidth availability for clients connected through diverse networks and devices. This variability can lead to bandwidth fluctuations and slow response times, resulting in buffering or degraded streaming performance.
Reza Kalan   +3 more
wiley   +1 more source

VoIP Steganography Methods, a Survey

open access: yesCybernetics and Information Technologies, 2019
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other
Deepikaa S., Saravanan R.
doaj   +1 more source

Leveraging Gaussian Attention for Adapter‐Based Fine‐Tuning of WavLM in Audio Deepfake Detection

open access: yesInternational Journal of Intelligent Systems, Volume 2026, Issue 1, 2026.
The advancement of deepfake technology has enabled deepfake audio to achieve unprecedented realism, posing significant challenges to automatic speaker verification (ASV) systems and threatening information security in critical sectors such as telecommunications and banking.
Yuhan Wang   +4 more
wiley   +1 more source

A Black Box Analysis of Webrtc Mouth-To-Ear Delays

open access: yesCommunications, 2016
Due to the recent shift toward cloud based computing, some of the world's leading standardization bodies have combined forces to provide guidelines and standards for native implementation of RealTime Communication (RTC) in the browsers.
Oliwia Komperda   +2 more
doaj   +1 more source

Interviews via VoIP: benefits and disadvantages within a PhD study of SMEs [PDF]

open access: yes, 2009
The benefits and disadvantages of Voice over Internet Protocol (VoIP) are explored as part of a PhD study to conduct qualitative interviews to discuss risk management within records management.
Hay-Gibson, Naomi
core  

Intelligent Routing Protocol Development for Enhancing Quality of Service in Wireless Sensor Networks

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Reliable and secure routing is required in mission‐critical wireless sensor networks (MC‐WSNs), but currently trust‐based protocols such as ATRP are limited by their inability to adapt effectively to attack intensity and their fixed trust weighting.
Omar Ibrahim Mustafa   +3 more
wiley   +1 more source

Voz IP seguras implementadas en Redes Definidas por Software

open access: yesRevista de Ciencias Sociales, 2021
Hablar sobre las redes definidas por software, es un paradigma, son más agiles, escalables y dinámicas, para un mejor aumento de programación y automatización.
Byron Oviedo-Bayas   +3 more
doaj  

Pembangunan Infrastruktur Voice Over Internet Protocol di Organisasi Perangkat Daerah Boyolali menggunakan Server Elastix

open access: yesEmitor: Jurnal Teknik Elektro, 2017
Perkembangan teknologi informasi dan komunikasi yang semakin maju, didukung dengan jaringan internet yang semakin sering digunakan dalam kehidupan sehari-hari serta pentingnya komunikasi dalam sebuah lingkungan pemerintahan, maka dalam penelitian ini ...
Maftufin Exsan, Umi Fadlilah
doaj   +1 more source

Optimizing Service Differentiation Scheme with Sized-based Queue Management in DiffServ Networks [PDF]

open access: yes, 2012
In this paper we introduced Modified Sized-based Queue Management as a dropping scheme that aims to fairly prioritize and allocate more service to VoIP traffic over bulk data like FTP as the former one usually has small packet size with less impact to ...
Madi, Nadim K. M., Othman, Mohamed
core   +1 more source

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy