نتایج جستجو برای: sip ids
تعداد نتایج: 8192 فیلتر نتایج به سال:
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
پروتکل sip به عنوان پروتکل اصلی لایه کنترل در شبکه های نسل آینده و کاربردهای چند رسانه ای نظیر ویدئو کنفرانس، تلویزیون و تلفن اینترنتی (voip) مطرح شده است. اصلی ترین حملات موجود در voip با عنوان حملات سیل آسا شناخته می شوند که بیش از 98 درصد آن ها به علت مشکلات پیاده سازی و پیکربندی و کمتر از دو درصد آسیب پذیری های مربوطه به علت ضعف پروتکل به وقوع می پیوندند. در این مقاله یک مجموعه ویژگی برای ت...
VoIP systems is the new voice communication technology and is playing a key role in various sectors (Government, business, education etc) for the development of a country. Unfortunately, industry and academic researchers find difficulties to evaluate existing systems with focus on security to countermeasure the various attacks for either implementation in a real operator or future enhancement. ...
The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...
This article provides a comparison of two of the most promising technologies which are supposed to be used for enabling communications over the Internet: IMS and P2PSIP. As their fields of adoptions are totally different – operators and mobile networks for the former, Internet and ephemeral communities for the latter – interoperability rather than competition seems to be the key for achieving a...
پروتکل SIP به عنوان پروتکل اصلی لایه کنترل در شبکههای نسل آینده و کاربردهای چند رسانهای نظیر ویدئو کنفرانس، تلویزیون و تلفن اینترنتی (VoIP) مطرح شده است. اصلیترین حملات موجود در VoIP با عنوان حملات سیلآسا شناخته میشوند که بیش از 98 درصد آنها به علت مشکلات پیادهسازی و پیکربندی و کمتر از دو درصد آسیبپذیریهای مربوطه به علت ضعف پروتکل به وقوع میپیوندند. در این مقاله یک مجموعه ویژگی برای ت...
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
objective(s): this paper aims to investigate synergistic inhibition of polysaccharide from sepia esculenta ink (sip), a newly isolated marine polysaccharide in our laboratory, on breast cancer mda-mb-231 cells exposed to cisplatin. materials and methods: cell viability of mda-mb-231 cells was determined by cck 8 assay. median-effect concentration was analyzed using chou-talalay method that was ...
Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 ...
member of the teaching staff in yazd university. the musha'sha'ids'uprising in south region of mesopotamia and khoozestan was performed under the sayyid mohammad b.falah's leadership (died in 870 a.h.) and then shiite's centeral government under the centerality of hoveizeh was established. until now, we don,t have considerable works about sayyid mohammad b.falah's ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید