- Full text PDF available (1)
IPv6 is the next generation protocol designed by the IETF to replace the current version Internet protocol, IPv4. It is difficult to translate immediately from IPv4 to IPv6 because of financial and technical problems. So mixed IPv4/IPv6 network is expected to be formed. IPv6 is more secure than IPv4, but IPv6 still has many security vulnerabilities that are… (More)
SIP is an application-level signaling protocol that manages a mutual multimedia communication session. Presently, SIP is widely used with Internet messaging, games and with VoIP (voice over IP) due to advantages such as its simplicity, flexibility and variety of protocols. However, SIP is associated with many types of security issues and requires a… (More)
In order to adopt appropriate shift pattern to object vehicle, shift patterns should be revised by various road environment. However, too much time and money is spent in utilizing handmade procedure. The objective of this study is to develop the method which automatically can make base patterns and tuned patterns and to prove some advantages.
With the development of VoIP (Voice over IP) service, new security threats are expected to be appeared. However, existing IP network security solutions can not detect new VoIP specified network threats because they can not reflect characteristics of VoIP. In this paper, we propose a novel system that can monitor VoIP service and detect VoIP network threats… (More)
After 3GPP had selected SIP as the signaling protocol for IMS, it is expected that SIP plays an important role in IP multimedia services. But, since SIP-based services are offered over the internet, there are security threats inherited from the internet environment. There are also new security threats because new techniques have been introduced to deliver… (More)