Results 81 to 90 of about 21,969 (207)

Unlocking inpatient workload insights with electronic health record event logs

open access: yes
Journal of Hospital Medicine, Volume 20, Issue 1, Page 79-84, January 2025.
Marisha Burden   +5 more
wiley   +1 more source

Security Risks in IP Telephony

open access: yesAdvances in Electrical and Electronic Engineering, 2010
This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system.
Filip Rezac, Miroslav Voznak
doaj  

METHODS FOR ENHANCING SECURITY IN IP TELEPHONY

open access: yesInformation and Telecommunication Sciences
Background. The widespread adoption of IP telephony in corporate and operator networks has led to an increased risk of cyber threats such as fraud, eavesdropping, service interruptions and unauthorised access.
Serhii Fedorov, Rina Novogrudskaya
doaj   +1 more source

Automatic Classification of Attacks on IP Telephony

open access: yesAdvances in Electrical and Electronic Engineering, 2013
This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network.
Jakub Safarik   +4 more
doaj   +1 more source

Blindspot: Indistinguishable Anonymous Communications [PDF]

open access: yes, 2014
Communication anonymity is a key requirement for individuals under targeted surveillance. Practical anonymous communications also require indistinguishability - an adversary should be unable to distinguish between anonymised and non-anonymised traffic ...
Gardiner, Joseph, Nagaraja, Shishir
core   +1 more source

VoIP

open access: yesProceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, 2010
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP).
Radmand, Pedram   +4 more
openaire   +2 more sources

SPIT DETECTION AND PREVENTION

open access: yesElectrica, 2017
In telecommunication technology VoIP protocol has become a very popular technology as it is cheap, efficient. Also it has easy deployment. While it has lots of advantages it brings lots of vulnerabilities.
Selin KAMAS, Muhammed Ali AYDIN
doaj   +2 more sources

Tests of robustness of GMM speaker verification in VoIP telephony

open access: yesArchives of Acoustics, 2014
The paper presents the scores of the GMM (Gaussian Mixture Models) based speaker verification system for speech signal transmitted in VoIP (Voice over IP) telephony conditions.
Piotr Staroniewicz
doaj  

Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-Quantum Cryptography

open access: yesIEEE Access
Quantum technologies have emerged as vital tools for enhancing mobile communication security. The Samsung Galaxy series now features a quantum random number generator (QRNG) that offers true randomness, strengthening cryptographic protection. Despite its
Omar Alibrahim
doaj   +1 more source

Rising stars in information and communication technology [PDF]

open access: yes
The quest for more efficiency and security is reflected in the economy as a whole, but especially in the product and process innovations in information and communication technology (ICT).
Stefan Heng
core  

Home - About - Disclaimer - Privacy