Presence service in IMS

D Petras, I Baronak, E Chromy - The Scientific World Journal, 2013 - Wiley Online Library
This paper describes the presence service, which is located in the IP multimedia subsystem.
This service allows making many applications for different groups of people. The paper …

Automatic classification of attacks on IP telephony

J Safarik, P Partila, F Rezac, L Macura… - Advances in Electrical …, 2013 - advances.vsb.cz
This article proposes an algorithm for automatic analysis of attack data in IP telephony
network with a neural network. Data for the analysis is gathered from variable monitoring …

Multi-criteria analysis and prediction of network incidents using monitoring system

L Macura, M Voznak - Journal of Advanced Engineering and Computation, 2017 - jaec.vn
Today, network technologies can handle throughputs up to 100Gbps, transporting 200
million packets per second on a single link. Such high bandwidths impact network flow …

IP telephony server emulation for monitoring and analysis of malicious activity in VOIP network

J Safarik, M Voznak, F Rezac… - … -Scientific Letters of the …, 2013 - komunikacie.uniza.sk
The paper aims at gathering information about attacks from real internet infrastructure and
their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects …

[HTML][HTML] Employing monitoring system to analyze incidents in computer network

L Macura, J Rozhon, JCW Lin - … of the 3rd Czech-China Scientific …, 2017 - intechopen.com
Today, network technologies can handle throughputs or up to 100 Gbps, transporting 200
million packets per second on a single link. Such high bandwidths impact network flow …

Analyzing the medium-interaction honeypot: A case study

S Yüksel - 2018 - earsiv.cankaya.edu.tr
Internet usage in all regions of the world is increasing day by day. Cybercrime along with the
growth in number of online users are potential risks for data leakage. Universities and …

IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network

JSMVF Rezac, L Macura - ceeol.com
The paper aims at gathering information about attacks from real internet infrastructure and
their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects …

Atraindo, conhecendo e repudiando atacantes VoIP

D Bauermann, GL Emmert - … Brasileiro de Segurança da Informação e …, 2017 - sol.sbc.org.br
A expansão do uso de sistemas de voz sobre IP tem atraído um número cada vez maior de
indivíduos que buscam vulnerabilidades que podem causar prejuízos às organizações …