NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 1,458
1.
  • VoIP steganography and its ... VoIP steganography and its Detection—A survey
    Mazurczyk, Wojciech ACM computing surveys, 11/2013, Volume: 46, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually ...
Full text

PDF
2.
  • VoIP network covert channel... VoIP network covert channels to enhance privacy and information sharing
    Saenger, Jens; Mazurczyk, Wojciech; Keller, Jörg ... Future generation computer systems, October 2020, 2020-10-00, Volume: 111
    Journal Article
    Peer reviewed
    Open access

    Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perform attacks in a stealthy manner. Another important usage deals with privacy, for instance, to ...
Full text

PDF
3.
  • EFFECTIVIZATION OF THE TRAN... EFFECTIVIZATION OF THE TRANSPORT TELECOMMUNICATIONS DESIGN FOR CORPORATIVE SYSTEM OF AN INDUSTRIAL OBJECT
    V.V. DERGACHEV; I.E. VILINOV; A.V. VOLODIN Vestnik Donskogo gosudarstvennogo tehničeskogo universiteta (Online), 07/2018, Volume: 10, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Improvement of transport network design efficiency problems at the expense of the  system approach to the estimation of network quality and assigned communications services quality are considered. ...
Full text
4.
Full text

PDF
5.
  • Exploiting IP telephony wit... Exploiting IP telephony with silence suppression for hidden data transfers
    Schmidt, Sabine; Mazurczyk, Wojciech; Kulesza, Radoslaw ... Computers & security, November 2018, 2018-11-00, 20181101, Volume: 79
    Journal Article
    Peer reviewed

    Information hiding is increasingly used by malware for creating covert channels to exfiltrate data, orchestrate attacks, as well as to download additional code for extending its functionalities at ...
Full text
6.
  • An Efficient Method to Enha... An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks
    Abualhaj, Mosleh M.; Al-Khatib, Sumaya N.; Shambour, Qusai Y. ... Cybernetics and information technologies : CIT, 12/2021, Volume: 21, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth ...
Full text

PDF
7.
  • VoIP: A comprehensive surve... VoIP: A comprehensive survey on a promising technology
    Karapantazis, Stylianos; Pavlidou, Fotini-Niovi Computer networks (Amsterdam, Netherlands : 1999), 08/2009, Volume: 53, Issue: 12
    Journal Article
    Peer reviewed

    The Internet has burgeoned into a worldwide information superhighway during the past few years, giving rise to a host of new applications and services. Among them, Voice over IP (VoIP) is the most ...
Full text
8.
Full text

PDF
9.
  • A new dynamic speech encryp... A new dynamic speech encryption algorithm based on lorenz chaotic map over internet protocol
    Al-hazaimeh, Obaida M. International journal of electrical and computer engineering (Malacca, Malacca), 10/2020, Volume: 10, Issue: 5
    Journal Article

    This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security ...
Full text

PDF
10.
  • The Development of a Secure... The Development of a Secure Internet Protocol (IP) Network Based on Asterisk Private Branch Exchange (PBX)
    Yakubova, Mubarak; Manankova, Olga; Mukasheva, Assel ... Applied sciences, 10/2023, Volume: 13, Issue: 19
    Journal Article
    Peer reviewed
    Open access

    The research problem described in this article is related to the security of an IP network that is set up between two cities using hosting. The network is used for transmitting telephone traffic ...
Full text
1 2 3 4 5
hits: 1,458

Load filters