Results 71 to 80 of about 59,048 (264)
This study highlights the urgent need for effective real‐time network security solutions in the face of increasing cyber threats. It examines the performance of a logistic regression model enhanced by Bayesian optimization for detecting TOR traffic using the UNB‐CIC TOR‐NonTOR datasets and a Bayesian‐optimized random forest model for the CIC ...
Manisankar Sannigrahi +2 more
wiley +1 more source
ENHANCEMENT OF VoIP PERFROMANCE IN MANET USING FUZZY LOGIC
Voiceover Internet Protocol (VoIP) application is a vital technology that is quickly growing in the Mobile Ad hoc NETwork (MANET). Packet loss is a factor that can significantly affect the Quality of Service (QoS) for VoIP performance. Due to the dynamic
Abdusalam Yahya +1 more
doaj +1 more source
Communications report 2013-14 series: report 2 [PDF]
Are you one of the more than five million adult Australians now using a voice over internet protocol (VoIP) service? The evolution of VoIP in Australia, the second complementary report in the ACMA Communications report 2013–14 series, shows that VoIP ...
core
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson +3 more
core +1 more source
A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection
As the ability to circumvent internet censorship, encrypted proxies are widely used by criminals in illegal activities (e.g., online gambling and darknet transactions). Thus, detection of encrypted proxy traffic is important. In recent years, deep learning‐based approaches have become mainstream approaches. Many deep learning‐based approaches transform
Yanjie He, Wei Li, Vincenzo Conti
wiley +1 more source
Optimizing Service Differentiation Scheme with Sized-based Queue Management in DiffServ Networks [PDF]
In this paper we introduced Modified Sized-based Queue Management as a dropping scheme that aims to fairly prioritize and allocate more service to VoIP traffic over bulk data like FTP as the former one usually has small packet size with less impact to ...
Madi, Nadim K. M., Othman, Mohamed
core +1 more source
Mobile money services have become essential in providing financial inclusion, particularly in underserved and developing regions, by enabling access to banking, payments, and commerce through mobile devices. Despite their benefits, these services are increasingly targeted by fraudsters employing sophisticated text‐based schemes such as phishing ...
Umar Sayibu +4 more
wiley +1 more source
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg +3 more
core +1 more source
E-model MOS Estimate Improvement through Jitter Buffer Packet Loss Modelling
Proposed article analyses dependence of MOS as a voice call quality (QoS) measure estimated through ITU-T E-model under real network conditions with jitter. In this paper, a method of jitter effect is proposed.
Adrian Kovac +3 more
doaj +1 more source
Remote fieldwork: using portable wireless networks and backhaul links to participate remotely in fieldwork [PDF]
Fieldwork is an important means of contextualising knowledge and developing subject-specific and generic transferable skills. However, field locations are not always accessible.
Collins, Trevor, Gaved, Mark, Lea, John
core

