نتایج جستجو برای: حملات طوفانی سرورهای sip
تعداد نتایج: 5004 فیلتر نتایج به سال:
SIP is evolving as the dominant protocol for multimedia call control in IP networks and is expected to be widely deployed in the near future. Using SIP for supporting mobility in SIPbased networks appears as a very attractive alternative to Mobile IP, taking advantage of existing SIP infrastructure and signaling, while avoiding duplication of functionality. However, existing proposals for suppo...
OBJECTIVE Prophylactic indomethacin reduces severe intraventricular hemorrhage but may increase spontaneous intestinal perforation (SIP) in extremely low birth weight (ELBW) infants. Early feedings improve nutritional outcomes but may increase the risk of SIP. Despite their benefits, use of these therapies varies largely by physician preferences in part because of the concern for SIP. METHODS...
In certain types of multimedia communications, a Session Initiation Protocol (SIP) request is distributed to a group of SIP User Agents (UAs). The sender sends a single SIP request to a server which further distributes the request to the group. This SIP request contains a list of Uniform Resource Identifiers (URIs), which identify the recipients of the SIP request. This URI list is expressed as...
normal 0 false false false en-us x-none ar-sa microsoftinternetexplorer4
This paper describes an attack-directed approach to test SIP authentication vulnerabilities in session establishment and user registration. This approach aims to exercise the known areas of weakness including the inherent vulnerabilities in SIP specification and the implementation vulnerabilities caused by programmers’ negligence. By using this approach and a self-made testing tool, we have suc...
This document describes how to construct and interpret certain information in a PKIX-compliant (Public Key Infrastructure using X.509) certificate for use in a Session Initiation Protocol (SIP) over Transport Layer Security (TLS) connection. More specifically, this document describes how to encode and extract the identity of a SIP domain in a certificate and how to use that identity for SIP dom...
BACKGROUND Substance misuse is a well-recognized co-morbidity to psychosis and has been linked to poor prognostic outcomes in patients. Researchers have yet to investigate the difference in rates and characteristics between first-episode Substance Induced Psychosis (SIP) and primary psychosis. We aimed at comparing patients with SIP to primary psychosis patients with or without substance misuse...
Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document defines a Dynamic ...
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید