نتایج جستجو برای: حملات طوفانی سرورهای sip
تعداد نتایج: 5004 فیلتر نتایج به سال:
زمینه و هدف: پلیمورفیسمهای تک نوکلئوتیدی عامل ایجاد تنوع ژنتیکی در جانداران میباشند و در این میان، پلیمورفیسمهای تک نوکلئوتیدی غیر مترادف (nsSNPs) باعث تغییر در باقیماندههای اسیدآمینه میشوند. تحقیق اخیر با هدف بررسی احتمال ارتباط بین تمامی چندشکلیهای گزارششده از ژن پریون انسانی و بروز بیماری انجامشده است. مواد و روشها: در این مطالعه توالی اسیدآمینه ایزوفرم اصلی ژن پروتئین پریون انسان...
The rapid development of services provided on SIP networks not only define the necessity of creating new equipment and standards but also requires the development of new methods and programming software tools for modeling and analyzing the effectiveness of the overload control mechanisms in SIP-server networks. The modeling process utilizes mathematical and simulation models as well as simulato...
Today, the session initiation protocol (SIP) is the predominant protocol for Voice-over-IP (VoIP) signalling. The intention of this paper is to present an overview of VoIP security issues both current and future – focusing on SIP. We start by presenting some fundamental differences between VoIP and the public switched telephone network (PSTN). We then look at specific problems for SIP signallin...
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes how to u...
Session Initiation Protocol is a core protocol for coming real time communication networks, including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly susceptible to Denial-of-Service Attacks launched against SIP servers. More than 20 different research works have been published to address SIP-related DoS problems. In this survey we explain three different types of DoS a...
This document provides a methodology for benchmarking the Session Initiation Protocol (SIP) performance of devices. Terminology related to benchmarking SIP devices is described in the companion terminology document (RFC 7501). Using these two documents, benchmarks can be obtained and compared for different types of devices such as SIP Proxy Servers, Registrars, and Session Border Controllers. T...
Combining high throughput sequencing with stable isotope probing (HTS-SIP) is a powerful method for mapping in situ metabolic processes to thousands of microbial taxa. However, accurately mapping metabolic processes to taxa is complex and challenging. Multiple HTS-SIP data analysis methods have been developed, including high-resolution stable isotope probing (HR-SIP), multi-window high-resoluti...
Session Initiation Protocol (SIP) is a control protocol standardized by IETF and implemented on the application layer. It can be used to establish, modify, and terminate Internet conferencing, telephony and some other multimedia sessions.[1] SIP uses server and client architecture, Peer-toPeer (P2P) is another popular technology that accomplishes the same functionality in an overlay network whe...
The concept of network virtualization, such as network functions virtualization, has attracted considerable attention from telecom carriers and a live migration technique is a key feature of virtualization technology. However, there are some challenges associated with applying server virtualization technology including live migration to a SIP server. Previous work has not dealt with the perform...
SPAM, defined as sending unsolicited messages to someone in bulk, might be a problem on SIP open-wide deployed networks. The responsibility for filtering or blocking calls can belong to different elements in the call flow and may depend on various factors. This document defines an authorization based policy language that allows end users to upload anti-SPIT policies to intermediaries, such as S...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید