Results 21 to 30 of about 21,969 (207)

A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack

open access: yesApplied Sciences, 2023
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are widely deployed technologies since they provide an efficient and fast means of both voice and data communication over a single network.
Ismail Melih Tas, Selcuk Baktir
doaj   +1 more source

QoS Measurement of VoIP Codec Usage on Limited Bandwidth Network over UDP-based VPN

open access: yesTelfor Journal, 2020
The usage of internet protocol for voice communication is widely used and more efficient rather than an analog signal. However, there is no security guaranteed on IP-based voice communication.
B. S. Panca
doaj   +1 more source

Efficient Detection of Spam Over Internet Telephony by Machine Learning Algorithms

open access: yesIEEE Access, 2022
Recent trends show a growing interest in VoIP services and indicate that guaranteeing security in VoIP services and preventing hacker communities from attacking telecommunication solutions is a challenging task.
Ladislav Behan   +4 more
doaj   +1 more source

Covert Voice over Internet Protocol communications based on spatial model [PDF]

open access: yes, 2015
This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of ...
Huang, Yongfeng, Tang, Shanyu
core   +1 more source

Using Transcoding for Hidden Communication in IP Telephony [PDF]

open access: yes, 2011
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech   +2 more
core   +2 more sources

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

open access: yesInternational Journal of Telerehabilitation, 2010
Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and ...
Valerie J.M. Watzlaf   +2 more
doaj   +1 more source

Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks

open access: yesSensors, 2020
Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks.
Waleed Nazih   +4 more
doaj   +1 more source

ANALISIS PRODUKSI SUSU SAPI PERAH DI INDONESIA [PDF]

open access: yes, 2023
Cow's milk is large in contributing to meeting the needs of people in developing countries to meet nutritional fulfillment. Cow's milk has increased imports due to the problem of cow disease which cannot meet the needs of the Indonesian people who ...
Khairunnisa, Yanita Melga Fitria
core  

A Look at VoIP Vulnerabilities [PDF]

open access: yes, 2010
Voice over IP (VoIP) and Internet Multimedia Subsystem (IMS) technologies offer higher flexibility than traditional telephony infrastructures and the potential for lower cost through equipment consolidation and new business models.
Keromytis, Angelos D.
core   +2 more sources

Interoperability of secure VoIP terminals

open access: yes2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom), 2013
An interoperability test automation system has been implemented at the Wireless Communication Technologies Research Laboratory (KITAL) at TUBITAK BILGEM for secure IP communication terminals. Designed and manufactured at BILGEM, MILSEC-4 terminals provide VoIP signalling using SIP and end-to-end secure communication using SCIP protocols.
Kuyuk, Recep Talha   +8 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy