Results 31 to 40 of about 21,969 (207)
An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography
Voice-over IP (VoIP) technology is a kind of digital transmission technology based on IP network. It is one of the important methods to use voice service in VoIP as steganographic carrier to ensure secure transmission.
Lejun Zhang +4 more
doaj +1 more source
Non-Repudiation in Internet Telephony
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication.
Hett, Christian +2 more
core +1 more source
Intrusion detection mechanisms for VoIP applications [PDF]
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference ...
Festor, Olivier +2 more
core +3 more sources
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada +4 more
wiley +1 more source
VoIP: Making Secure Calls and Maintaining High Call Quality [PDF]
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS.
Arnedo Moreno, Joan +4 more
core
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma +4 more
wiley +1 more source
Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements
SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors.
Filip Rezac +4 more
doaj +1 more source
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li +3 more
wiley +1 more source
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson +3 more
core +1 more source
Net Neutrality and Consumer Access to Content [PDF]
‘Net Neutrality’ is a very heated and contested United States policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user’s ISP (or another ISP) blocks that access in ...
Marsden, Christopher
core +2 more sources

