2016 11th International Forum on Strategic Technology (IFOST) 2016
DOI: 10.1109/ifost.2016.7884168
|View full text |Cite
|
Sign up to set email alerts
|

The analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The accuracy is the degree of conformity of the received information with transmitted one. The accuracy assessment is the probability of the correct reception, equal to the ratio of the number of correctly received message symbols to the total number of transmitted symbols for a certain period of time [3].…”
Section: ∑�������mentioning
confidence: 99%
“…The accuracy is the degree of conformity of the received information with transmitted one. The accuracy assessment is the probability of the correct reception, equal to the ratio of the number of correctly received message symbols to the total number of transmitted symbols for a certain period of time [3].…”
Section: ∑�������mentioning
confidence: 99%
“…This can happen in case of password leaks, low password IJEEI ISSN: 2089-3272  database security, the use of outdated hashing methods such as MD5 and SHA1 [10], or access to the password database by phishing those users who have access to the password database. For example, frequent traffic leaks in the IP telephony network occur due to the use of outdated hash functions [11], which do not provide strong protection and as a result lead to loss or theft of traffic, in addition to attacks on personal data [12]- [16]. The use of rainbow tables in practice is not limited to attacks, they can also be used as a mechanism for cryptanalysis of telecommunication systems or recovery of a forgotten password.…”
Section: Introductionmentioning
confidence: 99%
“…But, despite the many advantages of the Asterisk PBX, the problem of secure data transmission in the network, especially when it is scaled when the PBX acts as an independent service system, remains not fully understood [28][29][30][31][32]. Most research is currently focused on protocols and encryption [33][34][35][36], as well as the quality of the transmitted voice traffic [37][38][39][40]. This does not eliminate the main threats as the attackers are currently focused on something else [41].…”
mentioning
confidence: 99%