X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (5173) 5173
Newspaper Article (5065) 5065
Magazine Article (2904) 2904
Conference Proceeding (2251) 2251
Newsletter (2168) 2168
Trade Publication Article (1354) 1354
Dissertation (652) 652
Book Chapter (251) 251
Publication (137) 137
Transcript (49) 49
Book / eBook (44) 44
Government Document (22) 22
Reference (22) 22
Paper (15) 15
Book Review (14) 14
Report (3) 3
Web Resource (3) 3
Data Set (2) 2
Market Research (2) 2
Standard (1) 1
Streaming Video (1) 1
Technical Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
voip (16947) 16947
internet telephony (2426) 2426
telecommunications services industry (2295) 2295
communications industry (2289) 2289
usage (1702) 1702
services (1208) 1208
forecasts and trends (994) 994
voice (960) 960
computer software industry (958) 958
telephone services (952) 952
technology application (950) 950
intellectual property (866) 866
internet (834) 834
telecommunications (785) 785
sip (728) 728
telephones (696) 696
patents (679) 679
cable telephony (652) 652
telecommunications equipment industry (648) 648
quality of service (626) 626
networks (625) 625
reports (610) 610
product introduction (601) 601
laws, regulations and rules (597) 597
qos (583) 583
engineering, electrical & electronic (552) 552
delay (517) 517
methods (474) 474
ip networks (458) 458
service introduction (457) 457
management (444) 444
protocols (439) 439
software (432) 432
telecommunications industry (411) 411
market research (407) 407
wireless communication systems (402) 402
computer science, information systems (401) 401
ip (385) 385
analysis (372) 372
computer network equipment industry (349) 349
bandwidth (328) 328
internet service providers (327) 327
customer services (318) 318
security (318) 318
contracts (312) 312
wireless networks (312) 312
cable television broadcasting industry (299) 299
servers (299) 299
網路電話 (289) 289
voice over ip (286) 286
industry forecasts (269) 269
marketing (264) 264
codecs (263) 263
internet protocol (256) 256
achievements and awards (251) 251
algorithms (250) 250
jitter (250) 250
speech (245) 245
computer science (242) 242
telecommunication (240) 240
wireless communication (237) 237
safety and security measures (236) 236
evaluation (231) 231
wi-fi (230) 230
standards (228) 228
computer services industry (224) 224
fernsprechübertragung (205) 205
computer networks (199) 199
planning (198) 198
innovations (197) 197
internet-protokoll (196) 196
cellular telephone services industry (193) 193
conferences, meetings and seminars (192) 192
packet loss (186) 186
transmission control protocol/internet protocol (184) 184
voice over internet protocol (184) 184
delays (181) 181
call centers (180) 180
wireless lan (180) 180
cloud computing (176) 176
research (174) 174
studies (174) 174
communication (172) 172
telephony (170) 170
streaming media (169) 169
telecommunication traffic (168) 168
authentication (165) 165
pbx (165) 165
surveys (165) 165
alliances and partnerships (164) 164
online services (162) 162
semiconductor industry (161) 161
computer communication networks (160) 160
service enhancement (160) 160
computer industry (158) 158
cellular telephones (154) 154
broadband transmission (153) 153
communications software (152) 152
wimax (152) 152
traffic flow (151) 151
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (16675) 16675
Chinese (777) 777
Japanese (317) 317
Korean (36) 36
Spanish (34) 34
German (33) 33
Portuguese (28) 28
Indonesian (15) 15
French (9) 9
Turkish (8) 8
Swedish (6) 6
Lithuanian (4) 4
Polish (3) 3
Bulgarian (1) 1
Croatian (1) 1
Romanian (1) 1
Russian (1) 1
Slovenian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 04/2017, Volume 29, Issue 7, pp. e3845 - n/a
Journal Article
Computers & Security, ISSN 0167-4048, 08/2018, Volume 77, pp. 1 - 20
In recent years, VoIP (Voice over IP) telephony has shown a tremendous increase in the number of subscribers due to today's affordable telephony rates and... 
Voice over IP (VoIP) | VoIP spam | SPam over Internet Telephony (SPIT) | SPIT detection | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | IDENTIFICATION | TELEPHONY | SPAM | Surveys | Usage | Fraud | Methods | VoIP (Network protocol)
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 09/2018, Volume 118, pp. 144 - 153
Mobile VoIP (Voice over Internet Protocol) has shown its widely prevalence and laid the feasibility for concealed communication. VoIP contains continuous and... 
Covert channel | UDP | VoIP | Undetectability | Throughput | Robustness | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | ENCRYPTION | PROXY SIGNATURE | NETWORKS | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SCHEME | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | EFFICIENT | Computer science | Cloud computing | VoIP (Network protocol)
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 11/2013, Volume 46, Issue 2, pp. 1 - 21
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier... 
VoIP | survey | Information hiding | IP telephony | steganography | Steganography | Survey | STEGANALYSIS | Algorithms | SPEECH INFORMATION | COVERT CHANNELS | COMPUTER SCIENCE, THEORY & METHODS | Security | Surveys | VoIP (Network protocol)
Journal Article
Cybernetics and Information Technologies, ISSN 1314-4081, 03/2019, Volume 19, Issue 1, pp. 73 - 87
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred... 
VoIP | LSB | PCM | QIM
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 02/2017, Volume 80, pp. 22 - 34
In this paper we present the design, implementation and experimental evaluation of Kerberos, an architecture for the detection of frauds in current generation... 
VoIP | Scalability | Fraud detection | Complex event processing | IMS networks | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | Analysis | Fraud | VoIP (Network protocol) | Fraud investigation
Journal Article
Computers & Security, ISSN 0167-4048, 11/2016, Volume 63, pp. 29 - 44
Voice-over-IP (VoIP) and its underlying session initiation protocol (SIP) techniques have become popular in recent years. VoIP/SIP techniques are used widely... 
Retransmission | SIP security | VoIP security | Next generation network | VoIP | DDoS | SIP | Incomplete transaction | IP spoofing | Unified communication | COMPUTER SCIENCE, INFORMATION SYSTEMS | FLOODING ATTACK | Denial of service attacks | Computer network protocols | Analysis | Detectors
Journal Article
Wireless Communications and Mobile Computing, ISSN 1530-8669, 07/2016, Volume 16, Issue 10, pp. 1192 - 1208
Support of Voice over Internet Protocol (VoIP) services in wireless mesh networks requires implementation of efficient policies to support low‐delay data... 
MOS | VoIP | wireless mesh networks | QUALITY | SERVICES | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Mesh networks | VoIP (Network protocol) | Wireless communication | Networks | Traffic flow | Telephones | Computer networks | Routing (telecommunications) | Voice | VoIP (protocol)
Journal Article
Wireless Networks, ISSN 1022-0038, 11/2018, Volume 24, Issue 8, pp. 2915 - 2926
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2012, Volume 14, Issue 2, pp. 514 - 537
We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set. We classify... 
Protocols | security | Taxonomy | Authentication | Media | VoIP | SIP | Servers | Internet telephony | ATTACKS | SESSION INITIATION PROTOCOL | COMPUTER SCIENCE, INFORMATION SYSTEMS | SPIT MANAGEMENT | TELECOMMUNICATIONS | CHALLENGES | SPAM | PERFORMANCE ANALYSIS | INFRASTRUCTURE | AUTHENTICATION SCHEME | TELEPHONY | Communities | Telephones | Classification | Byproducts | Security | Gaps | Voice | VoIP (protocol)
Journal Article
Journal of Telecommunications and Information Technology, ISSN 1509-4553, 2013, Volume 2013, Issue 1, pp. 79 - 84
Journal Article
Computer Networks, ISSN 1389-1286, 2009, Volume 53, Issue 12, pp. 2050 - 2090
The Internet has burgeoned into a worldwide information superhighway during the past few years, giving rise to a host of new applications and services. Among... 
IP Telephony | Call admission control | Voice quality | VoIP | Signaling protocols | Security | Voice codecs | NETWORK | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | DVB-RCS | PERFORMANCE | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | QOS | SYSTEMS | SERVICE | INFRASTRUCTURE | DELAY | BANDWIDTH | VoIP (Network protocol)
Journal Article
International Journal of Electrical and Computer Engineering, ISSN 2088-8708, 02/2016, Volume 6, Issue 1, pp. 235 - 241
VoIP | QoS | VPN | MPLS
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2019, Volume 151, pp. 287 - 294
VoIP emergency communications is a promising approach to improving the safety of citizens worldwide. The transition required in this scope includes... 
performance testing | NGN | NG112 | PSAP | VoIP | SIP | background traffic
Journal Article
Journal Article