Results 51 to 60 of about 36,043 (85)
Some of the next articles are maybe not open access.
JATI (Jurnal Mahasiswa Teknik Informatika)
Virtual Private Network (VPN) merupakan teknologi yang banyak digunakan untuk mengamankan data dan menjaga privasi saat berkomunikasi melalui jaringan publik. Namun, pengelolaan trafik jaringan VPN menimbulkan tantangan besar, seperti distribusi bandwith,
Harry Pribadi Fitrian +4 more
semanticscholar +1 more source
Virtual Private Network (VPN) merupakan teknologi yang banyak digunakan untuk mengamankan data dan menjaga privasi saat berkomunikasi melalui jaringan publik. Namun, pengelolaan trafik jaringan VPN menimbulkan tantangan besar, seperti distribusi bandwith,
Harry Pribadi Fitrian +4 more
semanticscholar +1 more source
Cross Protocol Attack on IPSec-based VPN
International Symposium on Digital Forensics and Security, 2023Network layer protocols that provide privacy, such as IPSec, are widely used in Virtual Private Network(VPN) services to provide security between two networks or hosts.
Amaldeep S, S. Sankaran
semanticscholar +1 more source
Enhancing Data Protection Provided by VPN Connections over Open WiFi Networks
Italian Conference on Theoretical Computer Science, 2019Open Wi-Fi networks are a serious challenge to sensitive and private data because it is hard to know who else is using the network and monitoring traffic. Such open, free and unencrypted networks might allow an adversary to hack devices connected to them
Ashraf Karaymeh +3 more
semanticscholar +1 more source
Comparing FlowVisor and Open Virtex as SDN-Based Site-to-Site VPN Services Solution
2019 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2019Site-to-Site Virtual Private Network (VPN) is a computer network technology made to establish secure and private data communication between geographically separated site for multiple tenants on the service provider network infrastructure, in a ...
G. N. Nurkahfi +3 more
semanticscholar +1 more source
VPN or Vpwn? How Afraid Should You be of VPN Traffic Identification?
Traffic Monitoring and AnalysisSeveral governments are gradually choosing to monitor VPN traffic. In this paper, we explore how hard or easy it would be for large ISP-scale adversaries to identify and block VPN traffic.
Tanmay Rajore +5 more
semanticscholar +1 more source
Implementasi Jaringan VPN Site-to-Site dan Protocol OSPF Menggunakan Cisco di Sekolah Bina Bangsa
Jurnal Informatika dan Teknik Elektro TerapanThe development of technology is currently very rapid. The need for information is critical, especially in work, this need continues to grow along with users who want fast, safe, and efficient information. Sekolah Bina Bangsa is not directly connected to
H. Prayitno, I. A. Sobari
semanticscholar +1 more source
International Journal of Open Information Technologies
В данной работе рассматривается проектирование, разработка и испытания прототипа прикладной системы с применением технологий искусственного интеллекта для автоматизированного анализа документации атомной отрасли, включая проверку соответствия ...
Д.Д. Шемонаев +3 more
semanticscholar +1 more source
В данной работе рассматривается проектирование, разработка и испытания прототипа прикладной системы с применением технологий искусственного интеллекта для автоматизированного анализа документации атомной отрасли, включая проверку соответствия ...
Д.Д. Шемонаев +3 more
semanticscholar +1 more source
Simulation-Based Analysis of MITM Attack Success and Prevention Using VPN and Network Segmentation
2025 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT)Man-in-the-Middle (MITM) attacks are common in insecure networks where an attacker can eavesdrop or intercept or modify traffic between two devices. In this work, we performed a practical simulation of a MITM attack using a virtual machine setup.
Monikanjali Tadepalli +2 more
semanticscholar +1 more source
Fingerprinting Voice Commands of VPN-protected Smart Speakers
ACM transactions on sensor networksExtensive recent research has shown that it is surprisingly easy to infer Amazon Alexa voice commands over their network traffic data. To prevent these traffic analytics (TA)-based inference attacks, smart home owners are considering deploying virtual ...
Xiaoguang Guo +3 more
semanticscholar +1 more source
Embedded VPN Router Using Raspberry Pi
2025 IEEE International Conference on Emerging Trends in Computing and Communication (ETCOM)With the assistance of Real-time Monitoring and Open-Source networking stacks, the system enhances secure and portable VPN routing on Raspberry Pi 5. WireGuard-based encryption optimized, Multi-client scalability and real-time traffic monitoring tools ...
V. S. S. Renesh +3 more
semanticscholar +1 more source

