Proceedings of the 2nd International Conference on Networking, Information Systems &Amp; Security 2019
DOI: 10.1145/3320326.3320334
|View full text |Cite
|
Sign up to set email alerts
|

Quality adaptation by using scalable video coding (SVC) over P2P IP Multimedia Subsystem (P2P IMS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 14 publications
0
0
0
Order By: Relevance
“…Such attacks can be launched over the security tunnels by an IA specifically if the parser's implementation is weak. Moreover, registration procedure data exchange through intermediaries as well by adapting the change in attack patterns [10] is time-consuming and complex. We note that if the user sends only two register requests, this results in 20 messages inside the network.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Such attacks can be launched over the security tunnels by an IA specifically if the parser's implementation is weak. Moreover, registration procedure data exchange through intermediaries as well by adapting the change in attack patterns [10] is time-consuming and complex. We note that if the user sends only two register requests, this results in 20 messages inside the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a similar vein, an adaptive data collection mechanism uses heuristic algorithms along with synthetic attack recognition. It helps to secure the data exchange through intermediaries as well by adapting the change in attack patterns [10]. It is applicable in Voice Over IP (VoIP) infrastructures of IMS where SIP protocol is responsible for session setup and session handling.…”
Section: Introductionmentioning
confidence: 99%