Results 31 to 40 of about 21,969 (207)

An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography

open access: yesIEEE Access, 2019
Voice-over IP (VoIP) technology is a kind of digital transmission technology based on IP network. It is one of the important methods to use voice service in VoIP as steganographic carrier to ensure secure transmission.
Lejun Zhang   +4 more
doaj   +1 more source

Non-Repudiation in Internet Telephony

open access: yes, 2007
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication.
Hett, Christian   +2 more
core   +1 more source

Intrusion detection mechanisms for VoIP applications [PDF]

open access: yes, 2006
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference ...
Festor, Olivier   +2 more
core   +3 more sources

Integrated LEO Constellation and In‐Cabin Distribution System for Continuous Aircraft 5G Connectivity

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada   +4 more
wiley   +1 more source

VoIP: Making Secure Calls and Maintaining High Call Quality [PDF]

open access: yes, 2010
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS.
Arnedo Moreno, Joan   +4 more
core  

Generative AI Implementation in Enterprises: Lessons From a Case Study of Enhanced IT Service Management

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma   +4 more
wiley   +1 more source

Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

open access: yesAdvances in Electrical and Electronic Engineering, 2011
SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors.
Filip Rezac   +4 more
doaj   +1 more source

Entrepreneurial Market Leadership Claims, Cultural Resonance, and Investor Evaluations in Nascent Markets: The Goldilocks Effect

open access: yesJournal of Management Studies, EarlyView.
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li   +3 more
wiley   +1 more source

Covert Channels in SIP for VoIP signalling

open access: yes, 2008
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson   +3 more
core   +1 more source

Net Neutrality and Consumer Access to Content [PDF]

open access: yes, 2007
‘Net Neutrality’ is a very heated and contested United States policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user’s ISP (or another ISP) blocks that access in ...
Marsden, Christopher
core   +2 more sources

Home - About - Disclaimer - Privacy