Articles with "voip" as a keyword



Photo by jordanmcdonald from unsplash

Performance Evaluation of Cognitive Radio VoIP Users in Fading Environment

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4709-y

Abstract: In this paper we investigate three channel allocation algorithms for multi-channel cognitive radio networks: SNR-based allocation (SA), queue-based allocation (QA), and queue-based SNR-aware allocation (QSA). The efficiency of the proposed algorithms is investigated for VoIP… read more here.

Keywords: voip; performance evaluation; evaluation cognitive; cognitive radio ... See more keywords
Photo from wikipedia

Effectiveness of SIP Server Under SIP Flooding Attack During VoIP Calls

Sign Up to like & get
recommendations!
Published in 2019 at "Wireless Personal Communications"

DOI: 10.1007/s11277-019-06519-3

Abstract: Voice over Internet Protocol (VoIP) service is increasingly one of the most widespread applications since few decades. Data traffic of VoIP service faces various challenges and threats. The Session Initiation Protocol (SIP) flooding attack is… read more here.

Keywords: flooding attack; voip; attack; sip ... See more keywords
Photo by saadahmad_umn from unsplash

ADVoIP: Adversarial Detection of Encrypted and Concealed VoIP

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2019.2922398

Abstract: A network attacker wants to transmit Voice-over-IP (VoIP) traffic streams covertly. He tries to evade the detection system by manipulating the VoIP streams through padding, shifting, and splitting operations, so as to conceal them amidst… read more here.

Keywords: tex math; inline formula; voip; detection ... See more keywords