Results 51 to 60 of about 21,969 (207)
Leveraging Gaussian Attention for Adapter‐Based Fine‐Tuning of WavLM in Audio Deepfake Detection
The advancement of deepfake technology has enabled deepfake audio to achieve unprecedented realism, posing significant challenges to automatic speaker verification (ASV) systems and threatening information security in critical sectors such as telecommunications and banking.
Yuhan Wang +4 more
wiley +1 more source
FractalNet-based key generation for authentication in Voice over IP using Blockchain
Voice over Internet Protocol (VoIP) has seen significant growth since the proliferation of the Internet, primarily due to its low-cost structure and simplicity in deployment.
Vajjala Sreenivasulu +1 more
doaj +1 more source
A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some less known SIP features by using the IP-spoofing technique, the reflection based attack logic and the DDoS attack logic.
I. Melih Tas +2 more
doaj +1 more source
Reliable and secure routing is required in mission‐critical wireless sensor networks (MC‐WSNs), but currently trust‐based protocols such as ATRP are limited by their inability to adapt effectively to attack intensity and their fixed trust weighting.
Omar Ibrahim Mustafa +3 more
wiley +1 more source
GRAPP&S, a Peer-to-Peer Middleware for Interlinking and Sharing Educational Resources [PDF]
This article presents GRAPP&S (Grid APPlication & Services), a specification of an E-learning architecture for the decentralized sharing of educational resources. By dealing with different resources such as files, data streams (video, audio, VoIP)
Thierno Ahmadou Diallo +3 more
doaj +1 more source
Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili +2 more
wiley +1 more source
Evaluation of eHealth Interventions to Prevent Pressure Injuries: A Scoping Review
ABSTRACT The aim of this scoping review was to map the literature pertaining to the use of eHealth interventions to prevent pressure injuries in populations at risk of the complication, and describe the interventions encountered with the help of Greenhalgh et al.'s Nonadoption, Abandonment, Scale‐up, Spread and Sustainability framework.
Arif Ahmad Kamil Ahmad +4 more
wiley +1 more source
Methodology for Studying the Level of Network Security of an IP PBX Server
This paper presents a methodology for studying the level of network security of VoIP platforms. The methodology is designed for VoIP platforms where the voice and video traffic passes through and are processed by the VoIP server itself, rather than being
Ivan Nedyalkov
doaj +1 more source
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary +3 more
wiley +1 more source
VoIP Security: Not an Afterthought [PDF]
Voice over IP (VoIP) promises to up-end a century-old model of voice telephony by breaking the traditional monolithic service model of the public switched telephone network (PSTN) and changing the point of control and provision from the central office switch to the end user’s device.
Douglas C. Sicker, Tom Lookabaugh
openaire +1 more source

