Results 21 to 30 of about 21,969 (207)
A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are widely deployed technologies since they provide an efficient and fast means of both voice and data communication over a single network.
Ismail Melih Tas, Selcuk Baktir
doaj +1 more source
QoS Measurement of VoIP Codec Usage on Limited Bandwidth Network over UDP-based VPN
The usage of internet protocol for voice communication is widely used and more efficient rather than an analog signal. However, there is no security guaranteed on IP-based voice communication.
B. S. Panca
doaj +1 more source
Efficient Detection of Spam Over Internet Telephony by Machine Learning Algorithms
Recent trends show a growing interest in VoIP services and indicate that guaranteeing security in VoIP services and preventing hacker communities from attacking telecommunication solutions is a challenging task.
Ladislav Behan +4 more
doaj +1 more source
Covert Voice over Internet Protocol communications based on spatial model [PDF]
This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of ...
Huang, Yongfeng, Tang, Shanyu
core +1 more source
Using Transcoding for Hidden Communication in IP Telephony [PDF]
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech +2 more
core +2 more sources
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance
Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and ...
Valerie J.M. Watzlaf +2 more
doaj +1 more source
Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks
Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks.
Waleed Nazih +4 more
doaj +1 more source
ANALISIS PRODUKSI SUSU SAPI PERAH DI INDONESIA [PDF]
Cow's milk is large in contributing to meeting the needs of people in developing countries to meet nutritional fulfillment. Cow's milk has increased imports due to the problem of cow disease which cannot meet the needs of the Indonesian people who ...
Khairunnisa, Yanita Melga Fitria
core
A Look at VoIP Vulnerabilities [PDF]
Voice over IP (VoIP) and Internet Multimedia Subsystem (IMS) technologies offer higher flexibility than traditional telephony infrastructures and the potential for lower cost through equipment consolidation and new business models.
Keromytis, Angelos D.
core +2 more sources
Interoperability of secure VoIP terminals
An interoperability test automation system has been implemented at the Wireless Communication Technologies Research Laboratory (KITAL) at TUBITAK BILGEM for secure IP communication terminals. Designed and manufactured at BILGEM, MILSEC-4 terminals provide VoIP signalling using SIP and end-to-end secure communication using SCIP protocols.
Kuyuk, Recep Talha +8 more
openaire +2 more sources

