Results 41 to 50 of about 21,969 (207)
ABSTRACT Geologic carbon storage in depleted oil and gas reservoirs is a key CO2 mitigation strategy, utilizing existing infrastructure such as injection wells and pipelines, while capitalizing on well‐characterized subsurface properties. This article introduces a versatile methodology designed to estimate critical parameters, including the number of ...
Nívia Morgana de Oliveira +2 more
wiley +1 more source
IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network
The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal ...
Jakub Safarik +3 more
doaj +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia +3 more
wiley +1 more source
Presenting a Method for Improving Echo Hiding [PDF]
In this article, one of the most important methods of steganography on VoIP called echo hiding is improved. This method has advantages in maintaining the statistical and perceptual characteristics of audio signals as well as security against the ...
hanieh rafiee, mohammad fakhredanesh
doaj +1 more source
Towards Steganography Detection Through Network Traffic Visualisation
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz +2 more
core +1 more source
Mobile consultant: Evaluation of additional services [PDF]
As the need for mobility in the medical world increases, newer systems and applications came to light; many of them based on wireless and mobile networks.
Banitsas, KA +3 more
core +1 more source
Abstract Following a request of the European Commission, EFSA assessed fish and other seafood consumption patterns and consumer awareness of related health risks and benefits across the 27 Member States, Iceland and Norway. Awareness of existence of consumption national advice and to which extent this advice influence consumers consumption behaviour ...
European Food Safety Authority (EFSA) +13 more
wiley +1 more source
Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid +5 more
core
ABSTRACT Smart cities represent transformative urban ecosystems, leveraging advanced technologies to address challenges posed by rapid urbanisation, energy efficiency demands, and sustainability goals. Despite extensive research, a comprehensive and integrated literature analysis combining AI‐based communication, energy management, cybersecurity, and ...
Maaz Tahir Malik +5 more
wiley +1 more source
The heterogeneity of the network at the edge creates unequal bandwidth availability for clients connected through diverse networks and devices. This variability can lead to bandwidth fluctuations and slow response times, resulting in buffering or degraded streaming performance.
Reza Kalan +3 more
wiley +1 more source

