Results 71 to 80 of about 21,969 (207)
A real-time SIP network simulation and monitoring system
In this work we present a real time SIP network simulation and monitoring system. The SIP network simulator is based on a probabilistic generative model that mimics a social network of VoIP subscribers calling each other at random times.
Çağatay Yıldız +4 more
doaj +1 more source
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim +3 more
wiley +1 more source
Penggunaan Virtual Private Network untuk Pengamanan Komunikasi pada VoIP [PDF]
Berkembangnya teknologi sekarang ini memacu untuk membuat teknologi yang semakin murah atau terjangkau. Seiring berkembangnya jaringan komputer yang semakin pesat memungkinkan untuk melewatkan trafik suara melalui jaringan komputer atau biasa yang ...
Setiawan, E. A. (Eko) +1 more
core
A Survey of Load Balancing Approaches Based on Switch Migration in Software‐Defined Networks
In this article, after discussing the load balancing of multiple controllers as one of the research challenges in this field, its solution through the switch migration is investigated. A variety of load balancing methods based on switch migration are investigated and then a comprehensive comparison is made between them.
Hamid Reza Naji, Harir Riyahi
wiley +1 more source
Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier.
Zhijun Wu +3 more
doaj +1 more source
Pilot Open Case Series of Voice over Internet Protocol-Delivered Assessment and Behavior Therapy for Chronic Tic Disorders [PDF]
Comprehensive Behavioral Intervention for Tics (CBIT) is an efficacious treatment for children with chronic tic disorders (CTDs). Nevertheless, many families of children with CTDs are unable to access CBIT due to a lack of adequately trained treatment ...
Bauer, Christopher C. +4 more
core +1 more source
Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM
The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global
david irwin +3 more
doaj
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone ...
Asma Jebrane +3 more
doaj +1 more source
The current issue of the International Journal of Telerehabilitation (IJT) contains original research evaluating the efficacy of telerehabilitation; an evaluation of a telerehabilitation system for community based research; and work that examines users ...
Ellen R. Cohn, Jana Cason
doaj +1 more source
Considerations on VoIP Throughput in 802.11 Networks
Voice data packets have to arrive at the destination in time, with a defined cadence and with low and constant delay in order to allow the real time voice reconstruction.
POTORAC, A. D.
doaj +1 more source

