Reliability and Security Analysis of VoIP Communication Systems
暂无分享,去创建一个
[1] Ohnmar Nhway. An investigation into the effect of security on reliability and voice recognition system in a VoIP network , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[2] Gerardo Rubino,et al. A perceptually sensitive Markovian model of packet loss processes during voip conversations , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[3] Vahideh Sadat Sadeghi,et al. Modulating two Independent Signals Simultaneously on Single Optical Wavelength , 2019, 2019 7th International Conference on Smart Computing & Communications (ICSCC).
[4] Ed Zaluska,et al. Analysis of a PBX Toll Fraud Honeypot , 2019 .
[5] Xingjun Wang,et al. A Proxy-Based Server Irrelevant Security Mechanism for VoIP , 2013, 2013 Sixth International Symposium on Computational Intelligence and Design.
[6] Mohammad Ilyas,et al. VoIP Handbook: Applications, Technologies, Reliability, and Security , 2008 .
[7] Ashish Kr. Luhach,et al. Research and analysis for adaptive IFIR Filters for voice quality enhancement in wireless VoIP , 2019 .
[8] Poonam Chakraborty,et al. Performance Analysis of LAN, MAN, WAN, and WLAN Topologies for VoIP Services Using OPNET Modeler , 2019 .
[9] Doan Perdana,et al. Performance Evaluation of VoIP Traffic in 5G Millimeter Wave Network , 2019 .
[10] Georgios Kambourakis,et al. The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems , 2019, IEEE Access.
[11] Andrew R. McGee,et al. Optimal availability and security for IMS-based VoIP networks , 2006, Bell Labs Technical Journal.
[12] Ross Cutler,et al. Analysis of problem tokens to rank factors impacting quality in VoIP applications , 2017, 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX).
[13] Nitesh Saxena,et al. Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines , 2018, J. Comput. Secur..