Results 11 to 20 of about 36,043 (85)

Automating VPN Configuration in Computer Networks

open access: yesIEEE Transactions on Dependable and Secure Computing
The configuration of security systems for communication protection, such as VPNs, is traditionally performed manually by human beings. However, because the complexity of this task becomes soon difficult to manage when its size increases, critical errors ...
Daniele Bringhenti   +2 more
semanticscholar   +3 more sources

Server resource dimensioning and routing of service function chain in NFV network architectures [PDF]

open access: yes, 2016
The Network Function Virtualization (NFV) technology aims at virtualizing the network service with the execution of the single service components in Virtual Machines activated on Commercial-off-the-shelf (COTS) servers.
Eramo, Vincenzo   +2 more
core   +3 more sources

Double binding energy differences: Mean-field or pairing effect?

open access: yes, 2012
In this paper we present a systematic analysis on the average interaction between the last protons and neutrons in atomic nuclei, which can be extracted from the double differences of nuclear binding energies.
Qi, Chong
core   +1 more source

Multi-service management in a multi-provider environment

open access: yes, 1995
As the spread of digital networks makes access to data communications globally available, the interest of communication service providers is switching away from the provision of these bearer networks and towards the provision of the value added services ...
Lewis, David, Tiropanis, Thanassis
core   +1 more source

AI-Enhanced VPN Security Framework: Integrating Open-Source Threat Intelligence and Machine Learning to Secure Digital Networks

open access: yesEuropean Conference on Cyber Warfare and Security
In today's digital age, ensuring network privacy and integrity is of utmost importance. To address this, our work proposed an advanced VPN security framework that integrates open-source threat intelligence and machine learning (ML) to enhance cyber ...
M. Hasan, Tania Malik
semanticscholar   +1 more source

Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)

open access: yesInternet of Things and Artificial Intelligence Journal, 2023
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the ...
Aliyyah Rosyidah, J. Parenreng
semanticscholar   +1 more source

Perancangan Ngn Berbasis Open Ims Core pada Jaringan Mpls Vpn [PDF]

open access: yes, 2017
Next Generation Network (NGN) merupakan pengiriman berbagai layanan (voice, video, dan data) melalui satu jaringan berdasarkan sistem Internet Protokol (IP).
Cahyadi, E. F. (Eko)   +2 more
core  

Existence of nodal solutions for Dirac equations with singular nonlinearities [PDF]

open access: yes, 2012
We prove, by a shooting method, the existence of infinitely many solutions of the form $\psi(x^0,x) = e^{-i\Omega x^0}\chi(x)$ of the nonlinear Dirac equation {equation*} i\underset{\mu=0}{\overset{3}{\sum}} \gamma^\mu \partial_\mu \psi- m\psi - F(\bar ...
K. Johnson   +6 more
core   +3 more sources

Open Vpn-access Server dengan Enskripsi Ssl/ti Open Ssl [PDF]

open access: yes, 2016
Computer network is one technology that is widely used by some companies today. one of the functions of a computer network is to connect one location to another.
Badrul, M. (Mohammad)
core   +1 more source

An Innovative Project to Strengthen and Improve the Knowledge Acquisition in the Degree in Chemistry Using e-Learning Tools [PDF]

open access: yes, 2018
Comunicació presentada a EDULEARN2018, 10th International Conference on Education and New Learning Technologies (July 2-4, 2018, Palma, Mallorca, Spain).The subject "Chemistry II (QU910)" is taught at first academic year (second semester) of the Degree ...
Albiol Chiva, Jaume   +10 more
core   +2 more sources

Home - About - Disclaimer - Privacy