Results 51 to 60 of about 21,969 (207)

Leveraging Gaussian Attention for Adapter‐Based Fine‐Tuning of WavLM in Audio Deepfake Detection

open access: yesInternational Journal of Intelligent Systems, Volume 2026, Issue 1, 2026.
The advancement of deepfake technology has enabled deepfake audio to achieve unprecedented realism, posing significant challenges to automatic speaker verification (ASV) systems and threatening information security in critical sectors such as telecommunications and banking.
Yuhan Wang   +4 more
wiley   +1 more source

FractalNet-based key generation for authentication in Voice over IP using Blockchain

open access: yesAin Shams Engineering Journal
Voice over Internet Protocol (VoIP) has seen significant growth since the proliferation of the Internet, primarily due to its low-cost structure and simplicity in deployment.
Vajjala Sreenivasulu   +1 more
doaj   +1 more source

A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism

open access: yesIEEE Access, 2020
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some less known SIP features by using the IP-spoofing technique, the reflection based attack logic and the DDoS attack logic.
I. Melih Tas   +2 more
doaj   +1 more source

Intelligent Routing Protocol Development for Enhancing Quality of Service in Wireless Sensor Networks

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Reliable and secure routing is required in mission‐critical wireless sensor networks (MC‐WSNs), but currently trust‐based protocols such as ATRP are limited by their inability to adapt effectively to attack intensity and their fixed trust weighting.
Omar Ibrahim Mustafa   +3 more
wiley   +1 more source

GRAPP&S, a Peer-to-Peer Middleware for Interlinking and Sharing Educational Resources [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2015
This article presents GRAPP&S (Grid APPlication & Services), a specification of an E-learning architecture for the decentralized sharing of educational resources. By dealing with different resources such as files, data streams (video, audio, VoIP)
Thierno Ahmadou Diallo   +3 more
doaj   +1 more source

Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo

open access: yesSoftware: Practice and Experience, Volume 55, Issue 8, Page 1337-1360, August 2025.
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili   +2 more
wiley   +1 more source

Evaluation of eHealth Interventions to Prevent Pressure Injuries: A Scoping Review

open access: yesInternational Wound Journal, Volume 22, Issue 7, July 2025.
ABSTRACT The aim of this scoping review was to map the literature pertaining to the use of eHealth interventions to prevent pressure injuries in populations at risk of the complication, and describe the interventions encountered with the help of Greenhalgh et al.'s Nonadoption, Abandonment, Scale‐up, Spread and Sustainability framework.
Arif Ahmad Kamil Ahmad   +4 more
wiley   +1 more source

Methodology for Studying the Level of Network Security of an IP PBX Server

open access: yesTelecom
This paper presents a methodology for studying the level of network security of VoIP platforms. The methodology is designed for VoIP platforms where the voice and video traffic passes through and are processed by the VoIP server itself, rather than being
Ivan Nedyalkov
doaj   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

VoIP Security: Not an Afterthought [PDF]

open access: yesQueue, 2004
Voice over IP (VoIP) promises to up-end a century-old model of voice telephony by breaking the traditional monolithic service model of the public switched telephone network (PSTN) and changing the point of control and provision from the central office switch to the end user’s device.
Douglas C. Sicker, Tom Lookabaugh
openaire   +1 more source

Home - About - Disclaimer - Privacy