Results 71 to 80 of about 59,048 (264)

Enhanced Network Traffic Classification Using Bayesian‐Optimized Logistic Regression and Random Forest Algorithm

open access: yesJournal of Engineering, Volume 2025, Issue 1, 2025.
This study highlights the urgent need for effective real‐time network security solutions in the face of increasing cyber threats. It examines the performance of a logistic regression model enhanced by Bayesian optimization for detecting TOR traffic using the UNB‐CIC TOR‐NonTOR datasets and a Bayesian‐optimized random forest model for the CIC ...
Manisankar Sannigrahi   +2 more
wiley   +1 more source

ENHANCEMENT OF VoIP PERFROMANCE IN MANET USING FUZZY LOGIC

open access: yesInternational Journal of Advances in Signal and Image Sciences, 2020
Voiceover Internet Protocol (VoIP) application is a vital technology that is quickly growing in the Mobile Ad hoc NETwork (MANET). Packet loss is a factor that can significantly affect the Quality of Service (QoS) for VoIP performance. Due to the dynamic
Abdusalam Yahya   +1 more
doaj   +1 more source

Communications report 2013-14 series: report 2 [PDF]

open access: yes
Are you one of the more than five million adult Australians now using a voice over internet protocol (VoIP) service? The evolution of VoIP in Australia, the second complementary report in the ACMA Communications report 2013–14 series, shows that VoIP ...

core  

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
As the ability to circumvent internet censorship, encrypted proxies are widely used by criminals in illegal activities (e.g., online gambling and darknet transactions). Thus, detection of encrypted proxy traffic is important. In recent years, deep learning‐based approaches have become mainstream approaches. Many deep learning‐based approaches transform
Yanjie He, Wei Li, Vincenzo Conti
wiley   +1 more source

Optimizing Service Differentiation Scheme with Sized-based Queue Management in DiffServ Networks [PDF]

open access: yes, 2012
In this paper we introduced Modified Sized-based Queue Management as a dropping scheme that aims to fairly prioritize and allocate more service to VoIP traffic over bulk data like FTP as the former one usually has small packet size with less impact to ...
Madi, Nadim K. M., Othman, Mohamed
core   +1 more source

Fraud Prediction and Prevention in Mobile Money Payment Systems (MMPS): A Systematic Literature Review of Text‐Based Detection Methods

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
Mobile money services have become essential in providing financial inclusion, particularly in underserved and developing regions, by enabling access to banking, payments, and commerce through mobile devices. Despite their benefits, these services are increasingly targeted by fraudsters employing sophisticated text‐based schemes such as phishing ...
Umar Sayibu   +4 more
wiley   +1 more source

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

open access: yes, 2015
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg   +3 more
core   +1 more source

E-model MOS Estimate Improvement through Jitter Buffer Packet Loss Modelling

open access: yesAdvances in Electrical and Electronic Engineering, 2011
Proposed article analyses dependence of MOS as a voice call quality (QoS) measure estimated through ITU-T E-model under real network conditions with jitter. In this paper, a method of jitter effect is proposed.
Adrian Kovac   +3 more
doaj   +1 more source

Remote fieldwork: using portable wireless networks and backhaul links to participate remotely in fieldwork [PDF]

open access: yes, 2010
Fieldwork is an important means of contextualising knowledge and developing subject-specific and generic transferable skills. However, field locations are not always accessible.
Collins, Trevor, Gaved, Mark, Lea, John
core  

Home - About - Disclaimer - Privacy