J Stanek, L Kencl - 2011 Proceedings of 20th International …, 2011 - ieeexplore.ieee.org
With the growing popularity of Voice-over-IP communication and of the SIP protocol, mobile networks including, denial-of-service attacks against the signaling are an increasingly …
IM Tas, B Ugurdogan, S Baktir - Computers & Security, 2016 - Elsevier
Abstract Voice-over-IP (VoIP) and its underlying session initiation protocol (SIP) techniques have become popular in recent years. VoIP/SIP techniques are used widely in unified …
Telephony Denial of Service (TDoS) attack is a form of Denial of Service (DoS) attack that targets telephone services, such as Voice over IP (VoIP), not allowing legitimate users to …
J Stanek, L Kencl - 2012 IEEE International Conference on …, 2012 - ieeexplore.ieee.org
As Voice-over-IP becomes a commonly used technology, the need to keep it secure and reliable has grown. Session Initiation Protocol (SIP) is most often used to deploy VoIP and …
Abstract Telephony Denial of Service (TDoS) attacks target telephony services, such as Voice over IP (VoIP), not allowing legitimate users to make calls. There are few defenses …
This research investigates Denial of Service (DoS) attacks targeting the Internet's Application Layer protocols, namely Session Initiation Protocol (SIP), and SPDY, the …
Telephony Denial of Service (TDoS) attacks target telephony services, such as Voice over IP (VoIP), not allowing legitimate users to make calls. There are few defenses that attempt to …
В Карпінець, АВ Приймак… - Правове, нормативне та …, 2018 - ir.lib.vntu.edu.ua
Розглянуто існуючі симетричні алгоритми шифрування інформації. Детально описано їх переваги та недоліки. Проведено експериментальне дослідження шифру Blowfish …