Mobile phishing attacks and defence mechanisms: State of art and open research challenges

D Goel, AK Jain - computers & security, 2018 - Elsevier
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …

A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

When evil calls: Targeted adversarial voice over ip network

H Liu, Z Yu, M Zha, XF Wang, W Yeoh… - Proceedings of the …, 2022 - dl.acm.org
As the COVID-19 pandemic fundamentally reshaped the remote life and working styles,
Voice over IP (VoIP) telephony and video conferencing have become a primary method of …

A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP)

MM Naeem, I Hussain, MMS Missen - Computer Networks, 2020 - Elsevier
Today, many organizations are transforming their traditional telephone services into Voice
over Internet Protocol (VoIP) systems. These services are simple to implement, but they are …

CO-CAC: A new approach to Call Admission Control for VoIP in 5G/WiFi UAV-based relay networks

V Mayor, R Estepa, A Estepa - Computer Communications, 2023 - Elsevier
Voice over IP (VoIP) requires a Call Admission Control (CAC) mechanism in WiFi networks
to preserve VoIP packet flows from excessive network delay or packet loss. Ideally, this …

Kurento: the Swiss army knife of WebRTC media servers

B Garcia, L Lopez-Fernandez… - IEEE …, 2017 - ieeexplore.ieee.org
In this article we introduce Kurento, an open source WebRTC media server and a set of
client APIs intended to simplify the development of applications with rich media capabilities …

[PDF][PDF] A comparison of voip performance evaluation on different environments over vpn multipoint network

A Alharbi, A Bahnasse, M Talea - International Journal of …, 2017 - researchgate.net
VPN Multipoint network is a kind of modern networking that allows the creation of dynamic
private IP tunnels between multiple sites automatically، quickly and with less configuration …

A worldwide study on the geographic locality of Internet routes

M Candela, V Luconi, A Vecchio - Computer Networks, 2021 - Elsevier
The topology of the Internet and its geographic properties received significant attention
during the last years, not only because they have a deep impact on the performance …

Unified call admission control in corporate domains

V Mayor, R Estepa, A Estepa, G Madinabeitia - Computer Communications, 2020 - Elsevier
Abstract Call Admission Control is a central mechanism for assurance of quality of service in
telephony. While CAC is integrated into Public Switched Telephony Network (PSTN), its …

[PDF][PDF] Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication.

M Kara, MA Aydın, HH Balık - Intelligent Automation & Soft …, 2022 - cdn.techscience.cn
Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they
carry out conversations over the Internet, which is an electronic communication line, and its …