Journal articles on the topic 'Voice over IP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Voice over IP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
S.R, Srividhya, and Anita Davamani K. "Deconstructing Voice-Over-IP." Journal of Advanced Research in Dynamical and Control Systems 11, no. 0009-SPECIAL ISSUE (September 25, 2019): 630–36. http://dx.doi.org/10.5373/jardcs/v11/20192615.
Full textSlay, Jill, and Matthew Simon. "Voice Over IP." International Journal of Digital Crime and Forensics 1, no. 1 (January 2009): 89–101. http://dx.doi.org/10.4018/jdcf.2009010106.
Full textMehta, P., and S. Udani. "Voice over IP." IEEE Potentials 20, no. 4 (2001): 36–40. http://dx.doi.org/10.1109/45.969596.
Full textVarshney, Upkar, Andy Snow, Matt McGivern, and Christi Howard. "Voice over IP." Communications of the ACM 45, no. 1 (January 2002): 89–96. http://dx.doi.org/10.1145/502269.502271.
Full textDantu, R., D. Ghosal, and H. Schulzrinne. "Securing voice over IP." IEEE Network 20, no. 5 (September 2006): 4–5. http://dx.doi.org/10.1109/mnet.2006.1705876.
Full textFrancis-Cobley, Pauline P., and Adrian D. Coward. "Voice over IP versus voice over frame relay." International Journal of Network Management 14, no. 4 (July 2004): 223–30. http://dx.doi.org/10.1002/nem.518.
Full textCole, R. G., and J. H. Rosenbluth. "Voice over IP performance monitoring." ACM SIGCOMM Computer Communication Review 31, no. 2 (April 2001): 9–24. http://dx.doi.org/10.1145/505666.505669.
Full textDOŁOWSKI, JERZY. "Interoperacyjność usługi Voice over IP." ELEKTRONIKA - KONSTRUKCJE, TECHNOLOGIE, ZASTOSOWANIA 1, no. 8 (August 5, 2018): 9–12. http://dx.doi.org/10.15199/13.2018.8.2.
Full textEdelson, Eve. "Voice over IP: security pitfalls." Network Security 2005, no. 2 (February 2005): 4–7. http://dx.doi.org/10.1016/s1353-4858(05)00196-0.
Full textDonglai FU, and Gouxi CHEN. "Batch Steganography for Voice over IP." International Journal of Digital Content Technology and its Applications 7, no. 5 (March 15, 2013): 804–11. http://dx.doi.org/10.4156/jdcta.vol7.issue5.94.
Full textGraham, Terence, and John Ure. "IP telephony and voice over broadband." info 7, no. 4 (August 2005): 8–20. http://dx.doi.org/10.1108/14636690510607268.
Full textCherry, S. "Seven myths about voice over IP." IEEE Spectrum 42, no. 3 (March 2005): 52–57. http://dx.doi.org/10.1109/mspec.2005.1402719.
Full textWalsh, T. J., and D. R. Kuhn. "Challenges in Securing Voice over IP." IEEE Security and Privacy Magazine 3, no. 3 (May 2005): 44–49. http://dx.doi.org/10.1109/msp.2005.62.
Full textYeo, C. K., S. C. Hui, I. Y. Soon, and L. M. Ang. "H.323 compliant voice over IP system." International Journal of Computer Applications in Technology 16, no. 4 (2003): 143. http://dx.doi.org/10.1504/ijcat.2003.000321.
Full textNarbutt, M., and L. Murphy. "Improving Voice Over IP Subjective Call Quality." IEEE Communications Letters 8, no. 5 (May 2004): 308–10. http://dx.doi.org/10.1109/lcomm.2004.827383.
Full textTipping, David. "The rising threats from Voice over IP." Network Security 2014, no. 12 (December 2014): 5–6. http://dx.doi.org/10.1016/s1353-4858(14)70120-5.
Full textLiberatore, Marc, Bikas Gurung, Brian Neil Levine, and Matthew Wright. "Empirical tests of anonymous voice over IP." Journal of Network and Computer Applications 34, no. 1 (January 2011): 341–50. http://dx.doi.org/10.1016/j.jnca.2010.06.009.
Full textWu, Yu-Sung, Vinita Apte, Saurabh Bagchi, Sachin Garg, and Navjot Singh. "Intrusion detection in voice over IP environments." International Journal of Information Security 8, no. 3 (December 16, 2008): 153–72. http://dx.doi.org/10.1007/s10207-008-0071-0.
Full textShahpasand, Maryam, Ramlan Mahmod, and Nur Izura Udzir. "Voice over IP on Windows IoT core." International Journal of Internet Technology and Secured Transactions 8, no. 3 (2018): 412. http://dx.doi.org/10.1504/ijitst.2018.093665.
Full textUdzir, Nur Izura, Maryam Shahpasand, and Ramlan Mahmod. "Voice over IP on Windows IoT core." International Journal of Internet Technology and Secured Transactions 8, no. 3 (2018): 412. http://dx.doi.org/10.1504/ijitst.2018.10014834.
Full textKeromytis, Angelos D. "Voice-over-IP Security: Research and Practice." IEEE Security & Privacy Magazine 8, no. 2 (March 2010): 76–78. http://dx.doi.org/10.1109/msp.2010.87.
Full textCharanek, Elias Abou, Hoseb Dermanilian, Imad Elhajj, Ayman Kayssi, and Ali Chehab. "E2VoIP2: Energy efficient voice over IP privacy." Computers & Security 30, no. 8 (November 2011): 815–29. http://dx.doi.org/10.1016/j.cose.2011.07.002.
Full textSchüller, F., T. Höher, and H. Weisgrab. "Die Firewall-Problematik bei Voice over IP." e & i Elektrotechnik und Informationstechnik 122, no. 1-2 (January 2005): 55–61. http://dx.doi.org/10.1007/bf03054024.
Full textBeritelli, F., G. Ruggeri, and G. Schembra. "TCP-friendly transmission of voice over IP." European Transactions on Telecommunications 14, no. 3 (2003): 193–203. http://dx.doi.org/10.1002/ett.4460140302.
Full textUzunalioglu, Huseyin, David J. Houck, and Y. T. Wang. "Call admission control for voice over IP." International Journal of Communication Systems 19, no. 4 (2006): 363–80. http://dx.doi.org/10.1002/dac.783.
Full textMolitor, Andrew. "Deploying a Dynamic Voice-Over-IP Firewall with IP Telephony Applications." EDPACS 28, no. 11 (May 2001): 1–9. http://dx.doi.org/10.1201/1079/43268.28.11.20010501/30394.2.
Full textWu, Zhijun, Junjun Guo, Chenlei Zhang, and Changliang Li. "Steganography and Steganalysis in Voice over IP: A Review." Sensors 21, no. 4 (February 3, 2021): 1032. http://dx.doi.org/10.3390/s21041032.
Full textLewis, A. "Packets in peril [voice over IP security issues]." IEE Review 50, no. 11 (November 1, 2004): 30–34. http://dx.doi.org/10.1049/ir:20041102.
Full textZeadally, S., F. Siddiqui, and P. Kubher. "Voice over IP in Intranet and Internet environments." IEE Proceedings - Communications 151, no. 3 (2004): 263. http://dx.doi.org/10.1049/ip-com:20040284.
Full textShiferaw Heyi, Binyam. "Voice over IP End-to-End Delay Measurements." American Journal of Networks and Communications 4, no. 4 (2015): 85. http://dx.doi.org/10.11648/j.ajnc.20150404.11.
Full textDwivedi, S. S., and Ajit Singh. "A Study an evaluation of Voice over IP." International Journal of Computer Trends and Technology 40, no. 2 (October 25, 2016): 92–94. http://dx.doi.org/10.14445/22312803/ijctt-v40p117.
Full textTian, Hui, Jie Qin, Yongfeng Huang, Yonghong Chen, Tian Wang, Jin Liu, and Yiqiao Cai. "Optimal matrix embedding for Voice-over-IP steganography." Signal Processing 117 (December 2015): 33–43. http://dx.doi.org/10.1016/j.sigpro.2015.05.001.
Full textJUNG, Y. "-Adaptive Playout Scheme for Voice over IP Applications." IEICE Transactions on Communications E88-B, no. 5 (May 1, 2005): 2189–92. http://dx.doi.org/10.1093/ietcom/e88-b.5.2189.
Full textMayers, Scott A., Patrick Flannelly, and R. Craig Zavadil. "IMPROVING CUSTOMER SERVICE USING VOICE OVER IP TECHNOLOGIES." Proceedings of the Water Environment Federation 2004, no. 2 (January 1, 2004): 372–86. http://dx.doi.org/10.2175/193864704784342181.
Full textHong Liu and P. Mouchtaris. "Voice over IP signaling: H.323 and beyond." IEEE Communications Magazine 38, no. 10 (2000): 142–48. http://dx.doi.org/10.1109/35.874981.
Full textZubey, Michael L., William Wagner, and James R. Otto. "A conjoint analysis of voice over IP attributes." Internet Research 12, no. 1 (March 2002): 7–15. http://dx.doi.org/10.1108/10662240210415781.
Full textWei, Ziling, Baokang Zhao, Bo Liu, Jinshu Su, Liyang Xu, and Erci Xu. "A novel steganography approach for voice over IP." Journal of Ambient Intelligence and Humanized Computing 5, no. 4 (December 17, 2013): 601–10. http://dx.doi.org/10.1007/s12652-013-0212-9.
Full textHunt, G., and P. Arden. "QoS requirements for a voice-over-IP PSTN." BT Technology Journal 23, no. 2 (April 2005): 37–47. http://dx.doi.org/10.1007/s10550-005-0005-6.
Full textYang, Fuzheng, Liangliang Jiang, and Xiao Li. "Real-time quality assessment for voice over IP." Concurrency and Computation: Practice and Experience 24, no. 11 (November 13, 2011): 1192–99. http://dx.doi.org/10.1002/cpe.1907.
Full textBan, Tae Won, and Bang Chul Jung. "Capacity Analysis of VoIP over LTE Network." Journal of the Korean Institute of Information and Communication Engineering 16, no. 11 (November 30, 2012): 2405–10. http://dx.doi.org/10.6109/jkiice.2012.16.11.2405.
Full textAbu Alhaj, Mosleh M., Ahmed Manasrah, Mahmoud Baklizi, and Nibras. "Transport Layer Protocols Taxonomy From Voice Over Ip Perspective." Advanced Computing: An International Journal 2, no. 4 (July 31, 2011): 9–21. http://dx.doi.org/10.5121/acij.2011.2402.
Full textTian, Hui, Jun Sun, Chin-Chen Chang, Yongfeng Huang, and Yonghong Chen. "Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication." IEEE Communications Letters 22, no. 6 (June 2018): 1196–99. http://dx.doi.org/10.1109/lcomm.2018.2822804.
Full textRizzetto, D., and C. Catania. "A voice over IP service architecture for integrated communications." IEEE Internet Computing 3, no. 3 (1999): 53–62. http://dx.doi.org/10.1109/4236.769423.
Full textCruickshank, H., Z. Sun, F. Carducci, and A. Sánchez. "Analysis of IP voice conferencing over EuroSkyWay satellite system." IEE Proceedings - Communications 148, no. 4 (2001): 202. http://dx.doi.org/10.1049/ip-com:20010392.
Full textWright, Charles V., Lucas Ballard, Scott E. Coull, Fabian Monrose, and Gerald M. Masson. "Uncovering Spoken Phrases in Encrypted Voice over IP Conversations." ACM Transactions on Information and System Security 13, no. 4 (December 2010): 1–30. http://dx.doi.org/10.1145/1880022.1880029.
Full textRizzetto, D., and C. Catania. "A voice over IP service architecture for integrated communications." IEEE Network 13, no. 3 (1999): 34–40. http://dx.doi.org/10.1109/65.767137.
Full textTian, Hui, Jie Qin, Shuting Guo, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, and Yiqiao Cai. "Improved adaptive partial-matching steganography for Voice over IP." Computer Communications 70 (October 2015): 95–108. http://dx.doi.org/10.1016/j.comcom.2015.08.011.
Full textTian, Hui, Ke Zhou, and Dan Feng. "Dynamic matrix encoding strategy for voice-over-IP steganography." Journal of Central South University of Technology 17, no. 6 (December 2010): 1285–92. http://dx.doi.org/10.1007/s11771-010-0633-y.
Full textNguyen, T., F. Yegenoglu, A. Sciuto, and R. Subbarayan. "Voice over IP service and performance in satellite networks." IEEE Communications Magazine 39, no. 3 (March 2001): 164–71. http://dx.doi.org/10.1109/35.910604.
Full textBaumgart, I. "Neue Entwicklungen im Bereich dezentraler Voice-over-IP-Netze." PIK - Praxis der Informationsverarbeitung und Kommunikation 30, no. 4 (January 2007): 199–205. http://dx.doi.org/10.1515/piko.2007.199.
Full text