Results 71 to 80 of about 21,969 (207)

A real-time SIP network simulation and monitoring system

open access: yesSoftwareX, 2018
In this work we present a real time SIP network simulation and monitoring system. The SIP network simulator is based on a probabilistic generative model that mimics a social network of VoIP subscribers calling each other at random times.
Çağatay Yıldız   +4 more
doaj   +1 more source

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

Penggunaan Virtual Private Network untuk Pengamanan Komunikasi pada VoIP [PDF]

open access: yes, 2014
Berkembangnya teknologi sekarang ini memacu untuk membuat teknologi yang semakin murah atau terjangkau. Seiring berkembangnya jaringan komputer yang semakin pesat memungkinkan untuk melewatkan trafik suara melalui jaringan komputer atau biasa yang ...
Setiawan, E. A. (Eko)   +1 more
core  

A Survey of Load Balancing Approaches Based on Switch Migration in Software‐Defined Networks

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
In this article, after discussing the load balancing of multiple controllers as one of the research challenges in this field, its solution through the switch migration is investigated. A variety of load balancing methods based on switch migration are investigated and then a comprehensive comparison is made between them.
Hamid Reza Naji, Harir Riyahi
wiley   +1 more source

Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec

open access: yesFuture Internet, 2020
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier.
Zhijun Wu   +3 more
doaj   +1 more source

Pilot Open Case Series of Voice over Internet Protocol-Delivered Assessment and Behavior Therapy for Chronic Tic Disorders [PDF]

open access: yes, 2016
Comprehensive Behavioral Intervention for Tics (CBIT) is an efficacious treatment for children with chronic tic disorders (CTDs). Nevertheless, many families of children with CTDs are unable to access CBIT due to a lack of adequately trained treatment ...
Bauer, Christopher C.   +4 more
core   +1 more source

Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM

open access: yesJournal of Digital Forensics, Security and Law, 2011
The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global
david irwin   +3 more
doaj  

A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves

open access: yesJournal of Telecommunications and Information Technology, 2017
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone ...
Asma Jebrane   +3 more
doaj   +1 more source

Editor's Note

open access: yesInternational Journal of Telerehabilitation, 2012
The current issue of the International Journal of Telerehabilitation (IJT) contains original research evaluating the efficacy of telerehabilitation; an evaluation of a telerehabilitation system for community based research; and work that examines users ...
Ellen R. Cohn, Jana Cason
doaj   +1 more source

Considerations on VoIP Throughput in 802.11 Networks

open access: yesAdvances in Electrical and Computer Engineering, 2009
Voice data packets have to arrive at the destination in time, with a defined cadence and with low and constant delay in order to allow the real time voice reconstruction.
POTORAC, A. D.
doaj   +1 more source

Home - About - Disclaimer - Privacy