Academic literature on the topic 'VoIP-networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'VoIP-networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "VoIP-networks"
Daramola, Oladunni Abosede. "QUALITY OF SERVICE ISSUES IN WIRELESS VOICE OVER INTERNET PROTOCOL." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 10 (2017): 57. http://dx.doi.org/10.23956/ijarcsse.v7i10.386.
Full textWisam Dawood Abdullah. "EVALUATION OF VOIP TRAFFICS OVER TIKRIT UNIVERSITY NETWORKS." Tikrit Journal of Pure Science 21, no. 1 (2023): 140–46. http://dx.doi.org/10.25130/tjps.v21i1.964.
Full textKolhar, Manjur. "Zeroize: A New Method to Improve the Utilization of 5G Networks When Running VoIP over IPv6." Applied System Innovation 4, no. 4 (2021): 72. http://dx.doi.org/10.3390/asi4040072.
Full textNisar, Kashif. "Voice Priority Queue Scheduling System Models for VoIP over WLANs." International Journal of Information Communication Technologies and Human Development 5, no. 1 (2013): 36–59. http://dx.doi.org/10.4018/jicthd.2013010103.
Full textAbualhaj, Mosleh M., and Sumaya N. Al-Khatib. "A New Method to Boost VoIP Performance Over IPv6 Networks." Transport and Telecommunication Journal 23, no. 1 (2022): 62–72. http://dx.doi.org/10.2478/ttj-2022-0006.
Full textSarkar, Nurul I., and Kashif Nisar. "Performance of VoIP in Wired-Cum-Wireless Ethernet Network." International Journal of Interdisciplinary Telecommunications and Networking 4, no. 4 (2012): 1–25. http://dx.doi.org/10.4018/jitn.2012100101.
Full textMaterna, Bogdan. "Proactive Security for VoIP Networks." Information Systems Security 15, no. 2 (2006): 16–21. http://dx.doi.org/10.1201/1086.1065898x/46051.15.2.20060501/93405.4.
Full textAtmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.
Full textLipatnikov, Valerij, Aleksandr Shevchenko, Vladislav Kosolapov, and Daniil Sokol. "Method for ensuring information security of a VOIP telephony network with a forecast of an intruder's intrusion strategy." Information and Control Systems, no. 1 (March 2, 2022): 54–67. http://dx.doi.org/10.31799/1684-8853-2022-1-54-67.
Full textEmara, Tamer Z. "Maximizing Power Saving for VoIP over WiMAX Systems." International Journal of Mobile Computing and Multimedia Communications 7, no. 1 (2016): 32–40. http://dx.doi.org/10.4018/ijmcmc.2016010103.
Full textDissertations / Theses on the topic "VoIP-networks"
Nassar, Mohamed. "VoIP Networks Monitoring and Intrusion Detection." Thesis, Nancy 1, 2009. http://www.theses.fr/2009NAN10021/document.
Full textNassar, Mohamed Festor Olivier. "VoIP Networks Monitoring and Intrusion Detection." S. l. : Nancy 1, 2009. http://www.scd.uhp-nancy.fr/docnum/SCD_T_2009_0021_NASSAR1.pdf.
Full textInácio, Rui Manuel Fernandes. "VoIP service performance evaluation over 3GPP networks." Master's thesis, Universidade de Aveiro, 2009. http://hdl.handle.net/10773/7357.
Full textDas, Gupta Jishu. "Performance issues for VOIP in Access Networks." Thesis, University of Southern Queensland, 2005. https://eprints.qut.edu.au/12724/1/Das_Gupta_MComputing_Dissertation.pdf.
Full textDeng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.
Full textVieira, Leandro Kravczuk. "Performance Analysis of a VoIP application in vehicular networks." Universidade Federal do CearÃ, 2011. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=7291.
Full textAguiño, Gonzalo Iglesias. "Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-1204.
Full textNazar, Arbab. "Evaluation of VoIP Codecs over 802.11 Wireless Networks : A Measurement Study." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3650.
Full textZhang, Ge. "Unwanted Traffic and Information Disclosure in VoIP Networks : Threats and Countermeasures." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13408.
Full textRadhakrishnan, Kapilan. "A non-intrusive method to evaluate perceived voice quality of VoIP networks using random neural networks." Thesis, Glasgow Caledonian University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.547414.
Full textBooks on the topic "VoIP-networks"
Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.
Find full textAri, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2008.
Find full textArenz, Stefan. Der Schutz der öffentlichen Sicherheit in Next Generation Networks am Beispiel von Internet-Telefonie-Diensten (VoIP): Zugleich eine Einordnung von Internet-Telefonie-Diensten in telekommunikationsrechtliche Kategorien unter Berücksichtigung europarechtlicher Vorgaben. Duncker & Humblot, 2010.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, та Korea (South) Chŏngbo Tʻongsinbu, ред. Chʻa sedae kopʻumjil VoIP haeksim wŏnchʻŏn kisul kaebal =: Development of next generation high-quality VoIP core technology. ETRI, 2005.
Find full textDwivedi, Himanshu. Hacking VoIP: Protocols, attacks, and countermeasures. No Starch Press, 2009.
Find full textManuel, Caballero José, ed. Triple play: Building the convergent network for IP, VOIP, and IPTV. Wiley, 2008.
Find full textThermos, Peter, and Ari Takanen. Securing VoIP Networks. Pearson Education, Limited, 2007.
Find full textThermos, Peter, and Ari Takanen. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, 2007.
Find full textMinoli, Daniel. Voice over IPv6: Architectures for Next Generation VoIP Networks. Elsevier Science & Technology Books, 2011.
Find full textBook chapters on the topic "VoIP-networks"
Patil, Hemant A., Aaron E. Cohen, and Keshab K. Parhi. "Speaker Identification over Narrowband VoIP Networks." In Forensic Speaker Recognition. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0263-3_6.
Full textKarol, M., P. Krishnan, and J. J. Li. "Using Overlay Networks to Improve VoIP Reliability." In Automated Technology for Verification and Analysis. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30476-0_32.
Full textKuo, Pei-Jeng, Koji Omae, Ichiro Okajima, and Narumi Umeda. "VoIP Quality Evaluation in Mobile Wireless Networks." In Advances in Multimedia Information Processing — PCM 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36228-2_85.
Full textKim, Kyungtae, and Chonggang Wang. "Enterprise VoIP in Fixed Mobile Converged Networks." In Multimedia Analysis, Processing and Communications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19551-8_22.
Full textChakraborty, Tamal, Iti Saha Misra, and Ramjee Prasad. "VoIP Over Emerging Networks: Case Study with Cognitive Radio Networks." In Springer Series in Wireless Technology. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95594-0_10.
Full textTrad, Abdelbasset, Qiang Ni, and Hossam Afifi. "Adaptive VoIP Transmission over Heterogeneous Wired/Wireless Networks." In Interactive Multimedia and Next Generation Networks. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30493-7_3.
Full textRodrigues, David, Eduardo Cerqueira, and Edmundo Monteiro. "QoE Assessment of VoIP in Next Generation Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04994-1_8.
Full textOchang, Paschal A., and Philip Irving. "Security Analysis of VoIP Networks Through Penetration Testing." In Communications in Computer and Information Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67642-5_50.
Full textLonkar, Smita Avinash, and K. T. V. Reddy. "Relative QoS Investigation of VoIP Over LTE Networks." In Nanoelectronics, Circuits and Communication Systems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7486-3_8.
Full textHruby, Martin, Michal Olsovsky, and Margareta Kotocova. "Solving VoIP QoS and Scalability Issues in Backbone Networks." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6190-2_41.
Full textConference papers on the topic "VoIP-networks"
Vichev, Vladimir, and Todorka Georgieva. "Behavior of VoIP Traffic QoS Metrics in Loaded Networks." In 2024 32nd National Conference with International Participation (TELECOM). IEEE, 2024. https://doi.org/10.1109/telecom63374.2024.10812328.
Full textCoulibaly, Elhalifa, and Lian Hao Liu. "Security of Voip networks." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5485790.
Full text"DENIAL OF SERVICE ISSUES IN VOICE OVER IP NETWORKS." In Special Session on Security in VoIP Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001403302300237.
Full text"A POLICY-BASED DESIGN METHODOLOGY AND PERFORMANCE EVALUATION FRAMEWORK FOR A SECURE VOIP INFRASTRUCTURE." In Special Session on Security in VoIP Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001405002090215.
Full text"SIP VULNERABILITIES TESTING IN SESSION ESTABLISHMENT & USER REGISTRATION." In Special Session on Security in VoIP Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001405402230229.
Full text"BLAZE: A MOBILE AGENT PARADIGM FOR VOIP INTRUSION DETECTION SYSTEMS." In Special Session on Security in VoIP Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001406002380245.
Full text"ON VULNERABILITY TESTING OF VOIP SOFTWARE - The Megaco/H.248 System as an Example." In Special Session on Security in VoIP Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001406102160222.
Full text"IMPLEMENTING MULTIPLE CHANNELS OVER SSL." In Special Session on Security in VoIP Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001406302460253.
Full textSengar, Hemant. "Overloading vulnerability of VoIP networks." In Networks (DSN). IEEE, 2009. http://dx.doi.org/10.1109/dsn.2009.5270310.
Full textHan, Bingjie, Jianfeng Guan, Wei Quan, and Changqiao Xu. "LB-VoIP: Enhancing access control of VoIP for secure networks." In 2015 International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2015. http://dx.doi.org/10.1109/atnac.2015.7366824.
Full text