Journal articles on the topic 'Voice over IP'

To see the other types of publications on this topic, follow the link: Voice over IP.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Voice over IP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S.R, Srividhya, and Anita Davamani K. "Deconstructing Voice-Over-IP." Journal of Advanced Research in Dynamical and Control Systems 11, no. 0009-SPECIAL ISSUE (September 25, 2019): 630–36. http://dx.doi.org/10.5373/jardcs/v11/20192615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Slay, Jill, and Matthew Simon. "Voice Over IP." International Journal of Digital Crime and Forensics 1, no. 1 (January 2009): 89–101. http://dx.doi.org/10.4018/jdcf.2009010106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mehta, P., and S. Udani. "Voice over IP." IEEE Potentials 20, no. 4 (2001): 36–40. http://dx.doi.org/10.1109/45.969596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Varshney, Upkar, Andy Snow, Matt McGivern, and Christi Howard. "Voice over IP." Communications of the ACM 45, no. 1 (January 2002): 89–96. http://dx.doi.org/10.1145/502269.502271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dantu, R., D. Ghosal, and H. Schulzrinne. "Securing voice over IP." IEEE Network 20, no. 5 (September 2006): 4–5. http://dx.doi.org/10.1109/mnet.2006.1705876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Francis-Cobley, Pauline P., and Adrian D. Coward. "Voice over IP versus voice over frame relay." International Journal of Network Management 14, no. 4 (July 2004): 223–30. http://dx.doi.org/10.1002/nem.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cole, R. G., and J. H. Rosenbluth. "Voice over IP performance monitoring." ACM SIGCOMM Computer Communication Review 31, no. 2 (April 2001): 9–24. http://dx.doi.org/10.1145/505666.505669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

DOŁOWSKI, JERZY. "Interoperacyjność usługi Voice over IP." ELEKTRONIKA - KONSTRUKCJE, TECHNOLOGIE, ZASTOSOWANIA 1, no. 8 (August 5, 2018): 9–12. http://dx.doi.org/10.15199/13.2018.8.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Edelson, Eve. "Voice over IP: security pitfalls." Network Security 2005, no. 2 (February 2005): 4–7. http://dx.doi.org/10.1016/s1353-4858(05)00196-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Donglai FU, and Gouxi CHEN. "Batch Steganography for Voice over IP." International Journal of Digital Content Technology and its Applications 7, no. 5 (March 15, 2013): 804–11. http://dx.doi.org/10.4156/jdcta.vol7.issue5.94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Graham, Terence, and John Ure. "IP telephony and voice over broadband." info 7, no. 4 (August 2005): 8–20. http://dx.doi.org/10.1108/14636690510607268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Cherry, S. "Seven myths about voice over IP." IEEE Spectrum 42, no. 3 (March 2005): 52–57. http://dx.doi.org/10.1109/mspec.2005.1402719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Walsh, T. J., and D. R. Kuhn. "Challenges in Securing Voice over IP." IEEE Security and Privacy Magazine 3, no. 3 (May 2005): 44–49. http://dx.doi.org/10.1109/msp.2005.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yeo, C. K., S. C. Hui, I. Y. Soon, and L. M. Ang. "H.323 compliant voice over IP system." International Journal of Computer Applications in Technology 16, no. 4 (2003): 143. http://dx.doi.org/10.1504/ijcat.2003.000321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Narbutt, M., and L. Murphy. "Improving Voice Over IP Subjective Call Quality." IEEE Communications Letters 8, no. 5 (May 2004): 308–10. http://dx.doi.org/10.1109/lcomm.2004.827383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tipping, David. "The rising threats from Voice over IP." Network Security 2014, no. 12 (December 2014): 5–6. http://dx.doi.org/10.1016/s1353-4858(14)70120-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liberatore, Marc, Bikas Gurung, Brian Neil Levine, and Matthew Wright. "Empirical tests of anonymous voice over IP." Journal of Network and Computer Applications 34, no. 1 (January 2011): 341–50. http://dx.doi.org/10.1016/j.jnca.2010.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wu, Yu-Sung, Vinita Apte, Saurabh Bagchi, Sachin Garg, and Navjot Singh. "Intrusion detection in voice over IP environments." International Journal of Information Security 8, no. 3 (December 16, 2008): 153–72. http://dx.doi.org/10.1007/s10207-008-0071-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Shahpasand, Maryam, Ramlan Mahmod, and Nur Izura Udzir. "Voice over IP on Windows IoT core." International Journal of Internet Technology and Secured Transactions 8, no. 3 (2018): 412. http://dx.doi.org/10.1504/ijitst.2018.093665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Udzir, Nur Izura, Maryam Shahpasand, and Ramlan Mahmod. "Voice over IP on Windows IoT core." International Journal of Internet Technology and Secured Transactions 8, no. 3 (2018): 412. http://dx.doi.org/10.1504/ijitst.2018.10014834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Keromytis, Angelos D. "Voice-over-IP Security: Research and Practice." IEEE Security & Privacy Magazine 8, no. 2 (March 2010): 76–78. http://dx.doi.org/10.1109/msp.2010.87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Charanek, Elias Abou, Hoseb Dermanilian, Imad Elhajj, Ayman Kayssi, and Ali Chehab. "E2VoIP2: Energy efficient voice over IP privacy." Computers & Security 30, no. 8 (November 2011): 815–29. http://dx.doi.org/10.1016/j.cose.2011.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Schüller, F., T. Höher, and H. Weisgrab. "Die Firewall-Problematik bei Voice over IP." e & i Elektrotechnik und Informationstechnik 122, no. 1-2 (January 2005): 55–61. http://dx.doi.org/10.1007/bf03054024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Beritelli, F., G. Ruggeri, and G. Schembra. "TCP-friendly transmission of voice over IP." European Transactions on Telecommunications 14, no. 3 (2003): 193–203. http://dx.doi.org/10.1002/ett.4460140302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Uzunalioglu, Huseyin, David J. Houck, and Y. T. Wang. "Call admission control for voice over IP." International Journal of Communication Systems 19, no. 4 (2006): 363–80. http://dx.doi.org/10.1002/dac.783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Molitor, Andrew. "Deploying a Dynamic Voice-Over-IP Firewall with IP Telephony Applications." EDPACS 28, no. 11 (May 2001): 1–9. http://dx.doi.org/10.1201/1079/43268.28.11.20010501/30394.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wu, Zhijun, Junjun Guo, Chenlei Zhang, and Changliang Li. "Steganography and Steganalysis in Voice over IP: A Review." Sensors 21, no. 4 (February 3, 2021): 1032. http://dx.doi.org/10.3390/s21041032.

Full text
Abstract:
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields.
APA, Harvard, Vancouver, ISO, and other styles
28

Lewis, A. "Packets in peril [voice over IP security issues]." IEE Review 50, no. 11 (November 1, 2004): 30–34. http://dx.doi.org/10.1049/ir:20041102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zeadally, S., F. Siddiqui, and P. Kubher. "Voice over IP in Intranet and Internet environments." IEE Proceedings - Communications 151, no. 3 (2004): 263. http://dx.doi.org/10.1049/ip-com:20040284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Shiferaw Heyi, Binyam. "Voice over IP End-to-End Delay Measurements." American Journal of Networks and Communications 4, no. 4 (2015): 85. http://dx.doi.org/10.11648/j.ajnc.20150404.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Dwivedi, S. S., and Ajit Singh. "A Study an evaluation of Voice over IP." International Journal of Computer Trends and Technology 40, no. 2 (October 25, 2016): 92–94. http://dx.doi.org/10.14445/22312803/ijctt-v40p117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tian, Hui, Jie Qin, Yongfeng Huang, Yonghong Chen, Tian Wang, Jin Liu, and Yiqiao Cai. "Optimal matrix embedding for Voice-over-IP steganography." Signal Processing 117 (December 2015): 33–43. http://dx.doi.org/10.1016/j.sigpro.2015.05.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

JUNG, Y. "-Adaptive Playout Scheme for Voice over IP Applications." IEICE Transactions on Communications E88-B, no. 5 (May 1, 2005): 2189–92. http://dx.doi.org/10.1093/ietcom/e88-b.5.2189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mayers, Scott A., Patrick Flannelly, and R. Craig Zavadil. "IMPROVING CUSTOMER SERVICE USING VOICE OVER IP TECHNOLOGIES." Proceedings of the Water Environment Federation 2004, no. 2 (January 1, 2004): 372–86. http://dx.doi.org/10.2175/193864704784342181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hong Liu and P. Mouchtaris. "Voice over IP signaling: H.323 and beyond." IEEE Communications Magazine 38, no. 10 (2000): 142–48. http://dx.doi.org/10.1109/35.874981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zubey, Michael L., William Wagner, and James R. Otto. "A conjoint analysis of voice over IP attributes." Internet Research 12, no. 1 (March 2002): 7–15. http://dx.doi.org/10.1108/10662240210415781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wei, Ziling, Baokang Zhao, Bo Liu, Jinshu Su, Liyang Xu, and Erci Xu. "A novel steganography approach for voice over IP." Journal of Ambient Intelligence and Humanized Computing 5, no. 4 (December 17, 2013): 601–10. http://dx.doi.org/10.1007/s12652-013-0212-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hunt, G., and P. Arden. "QoS requirements for a voice-over-IP PSTN." BT Technology Journal 23, no. 2 (April 2005): 37–47. http://dx.doi.org/10.1007/s10550-005-0005-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Fuzheng, Liangliang Jiang, and Xiao Li. "Real-time quality assessment for voice over IP." Concurrency and Computation: Practice and Experience 24, no. 11 (November 13, 2011): 1192–99. http://dx.doi.org/10.1002/cpe.1907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ban, Tae Won, and Bang Chul Jung. "Capacity Analysis of VoIP over LTE Network." Journal of the Korean Institute of Information and Communication Engineering 16, no. 11 (November 30, 2012): 2405–10. http://dx.doi.org/10.6109/jkiice.2012.16.11.2405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Abu Alhaj, Mosleh M., Ahmed Manasrah, Mahmoud Baklizi, and Nibras. "Transport Layer Protocols Taxonomy From Voice Over Ip Perspective." Advanced Computing: An International Journal 2, no. 4 (July 31, 2011): 9–21. http://dx.doi.org/10.5121/acij.2011.2402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Tian, Hui, Jun Sun, Chin-Chen Chang, Yongfeng Huang, and Yonghong Chen. "Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication." IEEE Communications Letters 22, no. 6 (June 2018): 1196–99. http://dx.doi.org/10.1109/lcomm.2018.2822804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Rizzetto, D., and C. Catania. "A voice over IP service architecture for integrated communications." IEEE Internet Computing 3, no. 3 (1999): 53–62. http://dx.doi.org/10.1109/4236.769423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cruickshank, H., Z. Sun, F. Carducci, and A. Sánchez. "Analysis of IP voice conferencing over EuroSkyWay satellite system." IEE Proceedings - Communications 148, no. 4 (2001): 202. http://dx.doi.org/10.1049/ip-com:20010392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Wright, Charles V., Lucas Ballard, Scott E. Coull, Fabian Monrose, and Gerald M. Masson. "Uncovering Spoken Phrases in Encrypted Voice over IP Conversations." ACM Transactions on Information and System Security 13, no. 4 (December 2010): 1–30. http://dx.doi.org/10.1145/1880022.1880029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Rizzetto, D., and C. Catania. "A voice over IP service architecture for integrated communications." IEEE Network 13, no. 3 (1999): 34–40. http://dx.doi.org/10.1109/65.767137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Tian, Hui, Jie Qin, Shuting Guo, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, and Yiqiao Cai. "Improved adaptive partial-matching steganography for Voice over IP." Computer Communications 70 (October 2015): 95–108. http://dx.doi.org/10.1016/j.comcom.2015.08.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tian, Hui, Ke Zhou, and Dan Feng. "Dynamic matrix encoding strategy for voice-over-IP steganography." Journal of Central South University of Technology 17, no. 6 (December 2010): 1285–92. http://dx.doi.org/10.1007/s11771-010-0633-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Nguyen, T., F. Yegenoglu, A. Sciuto, and R. Subbarayan. "Voice over IP service and performance in satellite networks." IEEE Communications Magazine 39, no. 3 (March 2001): 164–71. http://dx.doi.org/10.1109/35.910604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Baumgart, I. "Neue Entwicklungen im Bereich dezentraler Voice-over-IP-Netze." PIK - Praxis der Informationsverarbeitung und Kommunikation 30, no. 4 (January 2007): 199–205. http://dx.doi.org/10.1515/piko.2007.199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography