Results 81 to 90 of about 21,969 (207)
Unlocking inpatient workload insights with electronic health record event logs
Journal of Hospital Medicine, Volume 20, Issue 1, Page 79-84, January 2025.
Marisha Burden +5 more
wiley +1 more source
Security Risks in IP Telephony
This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system.
Filip Rezac, Miroslav Voznak
doaj
METHODS FOR ENHANCING SECURITY IN IP TELEPHONY
Background. The widespread adoption of IP telephony in corporate and operator networks has led to an increased risk of cyber threats such as fraud, eavesdropping, service interruptions and unauthorised access.
Serhii Fedorov, Rina Novogrudskaya
doaj +1 more source
Automatic Classification of Attacks on IP Telephony
This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network.
Jakub Safarik +4 more
doaj +1 more source
Blindspot: Indistinguishable Anonymous Communications [PDF]
Communication anonymity is a key requirement for individuals under targeted surveillance. Practical anonymous communications also require indistinguishability - an adversary should be unable to distinguish between anonymised and non-anonymised traffic ...
Gardiner, Joseph, Nagaraja, Shishir
core +1 more source
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP).
Radmand, Pedram +4 more
openaire +2 more sources
In telecommunication technology VoIP protocol has become a very popular technology as it is cheap, efficient. Also it has easy deployment. While it has lots of advantages it brings lots of vulnerabilities.
Selin KAMAS, Muhammed Ali AYDIN
doaj +2 more sources
Tests of robustness of GMM speaker verification in VoIP telephony
The paper presents the scores of the GMM (Gaussian Mixture Models) based speaker verification system for speech signal transmitted in VoIP (Voice over IP) telephony conditions.
Piotr Staroniewicz
doaj
Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-Quantum Cryptography
Quantum technologies have emerged as vital tools for enhancing mobile communication security. The Samsung Galaxy series now features a quantum random number generator (QRNG) that offers true randomness, strengthening cryptographic protection. Despite its
Omar Alibrahim
doaj +1 more source
Rising stars in information and communication technology [PDF]
The quest for more efficiency and security is reflected in the economy as a whole, but especially in the product and process innovations in information and communication technology (ICT).
Stefan Heng
core

