Results 51 to 60 of about 36,043 (85)
Some of the next articles are maybe not open access.

ANALISIS MANAJEMEN TRAFIK JARINGAN PADA VIRTUAL PRIVATE NETWORK (VPN) MENGGUNAKAN PROTOKOL PPTP, L2TP/IPSEC, DAN OPEN VPN

JATI (Jurnal Mahasiswa Teknik Informatika)
Virtual Private Network (VPN) merupakan teknologi yang banyak digunakan untuk mengamankan data dan menjaga privasi saat berkomunikasi melalui jaringan publik. Namun, pengelolaan trafik jaringan VPN menimbulkan tantangan besar, seperti distribusi bandwith,
Harry Pribadi Fitrian   +4 more
semanticscholar   +1 more source

Cross Protocol Attack on IPSec-based VPN

International Symposium on Digital Forensics and Security, 2023
Network layer protocols that provide privacy, such as IPSec, are widely used in Virtual Private Network(VPN) services to provide security between two networks or hosts.
Amaldeep S, S. Sankaran
semanticscholar   +1 more source

Enhancing Data Protection Provided by VPN Connections over Open WiFi Networks

Italian Conference on Theoretical Computer Science, 2019
Open Wi-Fi networks are a serious challenge to sensitive and private data because it is hard to know who else is using the network and monitoring traffic. Such open, free and unencrypted networks might allow an adversary to hack devices connected to them
Ashraf Karaymeh   +3 more
semanticscholar   +1 more source

Comparing FlowVisor and Open Virtex as SDN-Based Site-to-Site VPN Services Solution

2019 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2019
Site-to-Site Virtual Private Network (VPN) is a computer network technology made to establish secure and private data communication between geographically separated site for multiple tenants on the service provider network infrastructure, in a ...
G. N. Nurkahfi   +3 more
semanticscholar   +1 more source

VPN or Vpwn? How Afraid Should You be of VPN Traffic Identification?

Traffic Monitoring and Analysis
Several governments are gradually choosing to monitor VPN traffic. In this paper, we explore how hard or easy it would be for large ISP-scale adversaries to identify and block VPN traffic.
Tanmay Rajore   +5 more
semanticscholar   +1 more source

Implementasi Jaringan VPN Site-to-Site dan Protocol OSPF Menggunakan Cisco di Sekolah Bina Bangsa

Jurnal Informatika dan Teknik Elektro Terapan
The development of technology is currently very rapid. The need for information is critical, especially in work, this need continues to grow along with users who want fast, safe, and efficient information. Sekolah Bina Bangsa is not directly connected to
H. Prayitno, I. A. Sobari
semanticscholar   +1 more source

Разработка системы для анализа технических и организационных документов на соответствие нормативным требованиям атомной отрасли на основе больших лингвистических моделей

International Journal of Open Information Technologies
В данной работе рассматривается проектирование, разработка и испытания прототипа прикладной системы с применением технологий искусственного интеллекта для автоматизированного анализа документации атомной отрасли, включая проверку соответствия ...
Д.Д. Шемонаев   +3 more
semanticscholar   +1 more source

Simulation-Based Analysis of MITM Attack Success and Prevention Using VPN and Network Segmentation

2025 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT)
Man-in-the-Middle (MITM) attacks are common in insecure networks where an attacker can eavesdrop or intercept or modify traffic between two devices. In this work, we performed a practical simulation of a MITM attack using a virtual machine setup.
Monikanjali Tadepalli   +2 more
semanticscholar   +1 more source

Fingerprinting Voice Commands of VPN-protected Smart Speakers

ACM transactions on sensor networks
Extensive recent research has shown that it is surprisingly easy to infer Amazon Alexa voice commands over their network traffic data. To prevent these traffic analytics (TA)-based inference attacks, smart home owners are considering deploying virtual ...
Xiaoguang Guo   +3 more
semanticscholar   +1 more source

Embedded VPN Router Using Raspberry Pi

2025 IEEE International Conference on Emerging Trends in Computing and Communication (ETCOM)
With the assistance of Real-time Monitoring and Open-Source networking stacks, the system enhances secure and portable VPN routing on Raspberry Pi 5. WireGuard-based encryption optimized, Multi-client scalability and real-time traffic monitoring tools ...
V. S. S. Renesh   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy