نتایج جستجو برای: سرور sip
تعداد نتایج: 3191 فیلتر نتایج به سال:
increasing the popularity of sip based services (voip, iptv, ims infrastructure) lead to concerns about its security. the main signaling protocol of next generation networks and voip systems is session initiation protocol (sip). inherent vulnerabilities of sip, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in sip based infra...
پروتکل sip به عنوان پروتکل اصلی لایه کنترل در شبکه های نسل آینده و کاربردهای چند رسانه ای نظیر ویدئو کنفرانس، تلویزیون و تلفن اینترنتی (voip) مطرح شده است. اصلی ترین حملات موجود در voip با عنوان حملات سیل آسا شناخته می شوند که بیش از 98 درصد آن ها به علت مشکلات پیاده سازی و پیکربندی و کمتر از دو درصد آسیب پذیری های مربوطه به علت ضعف پروتکل به وقوع می پیوندند. در این مقاله یک مجموعه ویژگی برای ت...
The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...
This article provides a comparison of two of the most promising technologies which are supposed to be used for enabling communications over the Internet: IMS and P2PSIP. As their fields of adoptions are totally different – operators and mobile networks for the former, Internet and ephemeral communities for the latter – interoperability rather than competition seems to be the key for achieving a...
پروتکل SIP به عنوان پروتکل اصلی لایه کنترل در شبکههای نسل آینده و کاربردهای چند رسانهای نظیر ویدئو کنفرانس، تلویزیون و تلفن اینترنتی (VoIP) مطرح شده است. اصلیترین حملات موجود در VoIP با عنوان حملات سیلآسا شناخته میشوند که بیش از 98 درصد آنها به علت مشکلات پیادهسازی و پیکربندی و کمتر از دو درصد آسیبپذیریهای مربوطه به علت ضعف پروتکل به وقوع میپیوندند. در این مقاله یک مجموعه ویژگی برای ت...
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
objective(s): this paper aims to investigate synergistic inhibition of polysaccharide from sepia esculenta ink (sip), a newly isolated marine polysaccharide in our laboratory, on breast cancer mda-mb-231 cells exposed to cisplatin. materials and methods: cell viability of mda-mb-231 cells was determined by cck 8 assay. median-effect concentration was analyzed using chou-talalay method that was ...
Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 ...
This article provides a comparison of two of the most promising technologies which are supposed to be used for enabling communications over the Internet: IMS and P2PSIP. As their fields of adoptions are totally different – operators and mobile networks for the former, Internet and ephemeral communities for the latter – interoperability rather than competition seems to be the key for achieving a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید