Results 61 to 70 of about 21,969 (207)

IP Telephony Applicability in Cloud Computing

open access: yesJournal of Science and Research, 2018
This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations.
Francisco Palacios   +3 more
doaj   +1 more source

Systemization of Pluggable Transports for Censorship Resistance [PDF]

open access: yes, 2016
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ...
Khattak, Sheharbano   +2 more
core  

Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This research presents a novel approach for real‐time encrypted traffic classification (ETC) in programmable switches. By leveraging tree‐based machine learning models and P4 programmability, the proposed solution achieves high accuracy (up to 95%) for QUIC traffic classification with minimal overhead, demonstrating its potential for practical ...
Aristide Tanyi‐Jong Akem   +2 more
wiley   +1 more source

QoS Parameters Evaluation in a VPN-MPLS Diffserv Network under a Complete Free Software Emulation Environment

open access: yesRevista Científica y Tecnológica UPSE, 2017
The use of Virtual Private Network – Multi Protocol Label Switching (VPN-MPLS) networks has become very common inside enterprises thanks to their multiple advantages; such as, the private communication across a public network infrastructure between ...
Miroslava Aracely Zapata Rodríguez   +3 more
doaj   +1 more source

Interviews via VoIP: benefits and disadvantages within a PhD study of SMEs [PDF]

open access: yes, 2009
The benefits and disadvantages of Voice over Internet Protocol (VoIP) are explored as part of a PhD study to conduct qualitative interviews to discuss risk management within records management.
Hay-Gibson, Naomi
core  

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

A Deep-Reinforcement Learning Approach to Mitigate Vishing Attacks and Data Theft in Voice over Internet Protocol Calls

open access: yesJournal of High-Frequency Communication Technologies
Voice over Internet Protocol (VoIP) technology has transformed global communication by providing cost efficiency, scalability, and integration with digital platforms.
Solomon Malcolm Ekolama   +2 more
doaj   +1 more source

Optical, Wired and Wireless Multimedia Service Access Solutions for Trend Setting Real Estates

open access: yesCommunications, 2008
It is a well known fact that the value of real estates is raised tremendously by its connection to information technology services like Voice over IP (VoIP), IPTV, Video on Demand (VoD), basic Internet services and house-, security- and surveillance ...
Peter Mandl, P. Schrotter, E. Leitgeb
doaj   +1 more source

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

Implementation of Cloud Computing into VoIP [PDF]

open access: yesDatabase Systems Journal, 2012
This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses.
Floriana GEREA
doaj  

Home - About - Disclaimer - Privacy