An intelligent cyber security system against DDoS attacks in SIP networks

M Semerci, AT Cemgil, B Sankur - Computer Networks, 2018 - Elsevier
Abstract Distributed Denial of Services (DDoS) attacks are among the most encountered
cyber criminal activities in communication networks that can result in considerable financial …

Android mobile VoIP apps: a survey and examination of their security and privacy

A Azfar, KKR Choo, L Liu - Electronic Commerce Research, 2016 - Springer
Abstract Voice over Internet Protocol (VoIP) has become increasingly popular among
individuals and business organisations, with millions of users communicating using VoIP …

Dual server based security system for multimedia Services in Next Generation Networks

FJ Siddiqui, H Ashraf, A Ullah - Multimedia Tools and Applications, 2020 - Springer
Abstract Next Generation Networks (NGN) provide multimedia services to a large set of
users by maintaining concurrent sessions for multimedia services using IP multimedia sub …

A study of ten popular Android mobile VoIP applications: Are the communications encrypted?

A Azfar, KKR Choo, L Liu - 2014 47th Hawaii International …, 2014 - ieeexplore.ieee.org
Mobile Voice over Internet Protocol (mVoIP) applications have gained increasing popularity
in the last few years, with millions of users communicating using such applications (eg …

A fine-grained approach for anomaly detection in file system accesses with enhanced temporal user profiles

S Mehnaz, E Bertino - IEEE Transactions on Dependable and …, 2019 - ieeexplore.ieee.org
Protecting sensitive data from theft, exfiltration, and other kinds of abuses by malicious
insiders is a challenging problem. While access control mechanisms cannot always prevent …

Speeding-up text categorization in a grid computing environment

C Silva, B Ribeiro, U Lotric - Fourth International Conference on …, 2005 - ieeexplore.ieee.org
The amount of texts available in digital form has dramatically increased, giving rise to the
need of fast text classifiers. The tasks involved can be parallelized and distributed in a grid …

[PDF][PDF] Overcoming Trust Barriers: Evaluating Inter-Organisational Knowledge Sharing in UK Online Retail Sector'

R Chohan, M Shah, M Larson… - European Conference on …, 2014 - academia.edu
The changes in society such as the shift of business from onsite to online where the
customer is not present in person have made identity crimes easier and more attractive in …

Fine-Grained Anomaly Detection For In Depth Data Protection

S Mehnaz - 2020 - search.proquest.com
Data represent a key resource for all organizations we may think of. Thus, it is not surprising
that data are the main target of a large variety of attacks. Security vulnerabilities and …

Ανίχνευση και πρόληψη επιθέσεων άρνησης εξυπηρέτησης στα πρωτόκολλα SIP και SDP

Ζ Τσιάτσικας - 2019 - hellanicus.lib.aegean.gr
Οι πολυμεσικές υπηρεσίες που παρέχονται μέσω του Διαδικτύου, και συγκεκριμένα αυτές που
αξιοποιούν το πρωτόκολλο SIP για τη διαχείριση της σηματοδοσίας, συνεχίζουν να …

An evaluation of inter-organisational identity theft knowledge sharing practice in the UK retail sector

R Chohan - 2016 - clok.uclan.ac.uk
Knowledge is an essential source of competitive advantage in modern society and is
particularly important in the current on-line environment due to increased business …