Results 1 to 10 of about 21,949 (188)

Steganography and Steganalysis in Voice over IP: A Review [PDF]

open access: yesSensors, 2021
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu   +3 more
doaj   +2 more sources

Securing Session Initiation Protocol [PDF]

open access: yesSensors, 2022
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants.
Osama Younes, Umar Albalawi
doaj   +2 more sources

VoIP Security [PDF]

open access: yes, 2008
Internetová telefonie se dnes stává stále oblíbenější alternativou klasické telefonní služby. Důvodem může být její cena a také dostupnost. S oblíbeností rostou ale také rizika případného zneužití přenášených informací.
Černý, Michal
core   +2 more sources

Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger

open access: yesJournal of Computing Research and Innovation, 2020
VoIP application usage has increased from time to time and makes our daily life more convenient. VoIP application has features to make a phone call, send a text message and share the file through the apps for free. However, most of the users did not seem
Nur Khairani Kamarudin   +4 more
doaj   +5 more sources

Analysis and Prioritization of VoIP Security Challenges [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2018
P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources.
Saeid Bakhtiari, Esmaeil Zareh
doaj   +1 more source

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning

open access: yesIEEE Access, 2021
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services
Faiz Ul Islam   +3 more
doaj   +1 more source

Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol

open access: yesIEEE Access, 2023
Voice over Internet Protocols (VoIP) is an IP-based communication technology or commonly known as Internet Protocols (IP). In which, IP is currently widely used for mobile communication activities.
Setiyo Budiyanto, Dadang Gunawan
doaj   +1 more source

A Security Analysis on OpenSIPS

open access: yesIJAIT (International Journal of Applied Information Technology), 2020
IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet.
Gandeva Bayu Satrya   +1 more
doaj   +1 more source

Detecting SPIT Attacks in VoIP Networks Using Convolutional Autoencoders: A Deep Learning Approach

open access: yesApplied Sciences, 2023
Voice over Internet Protocol (VoIP) is a technology that enables voice communication to be transmitted over the Internet, transforming communication in both personal and business contexts by offering several benefits such as cost savings and integration ...
Waleed Nazih   +3 more
doaj   +1 more source

VoIP Security — Attacks and Solutions [PDF]

open access: yesInformation Security Journal: A Global Perspective, 2008
Voice over IP (VoIP) technology is being extensively and rapidly deployed. Flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues.
Phithakkitnukoon, Santi   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy