Results 61 to 70 of about 36,043 (85)
Some of the next articles are maybe not open access.

РАЗРАБОТКА И ИССЛЕДОВАНИЕ МЭМС-ДАТЧИКА КУРСА МОБИЛЬНОГО РОБОТА-ПОГРУЗЧИКА

Nanoindustry Russia
Разработан датчик курса на основе одноосевого МЭМС-датчика угловой скорости, предназначенный для определения ориентации мобильного робота-погрузчика.
С.А. Анчутин   +7 more
semanticscholar   +1 more source

Perancangan Jaringan VPN Dalam MPLS IP Antar Perusahaan Menggunakan Virtual Routing Forwarding Pada Router

SINUSOIDA
Jaringan Virtual Private Network (VPN) dalam Multi Protocol Label Switching (MPLS) adalah suatu bentuk komunikasi data yang menggunakan jaringan publik untuk menghubungkan dua atau lebih cabang komputer, pelanggan, secara tertutup yang dipisahkan oleh ...
Irmayani Irmayani   +2 more
semanticscholar   +1 more source

Post-Quantum Secure VPN: A Quantum-Resistant Protocol for Confidential Communication

2026 IEEE International Conference on Emerging Computing and Intelligent Technologies (ICoECIT)
The fast development of quantum computing presents a great threat to the security of classical cryptographic algorithms that support secure communication systems like Virtual Private Networks (VPNs).
P. Khan, G. G
semanticscholar   +1 more source

Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS

AlQalam journal of medical and applied sciences
This study presents a technical implementation and comparative analysis of a multi-site Wide Area Network (WAN) architecture connecting a central Headquarters (HQ) in Tripoli to three remote Branch Offices.
Samia Bilhaj, Nuredin Ahmed
semanticscholar   +1 more source

Amulets, boxers, and cybersecurity: influencer metaphors in VPN advertising and the communication of cybersecurity risk

Information research. An international electronic journal
Introduction. VPNs primarily establish encrypted tunnels for network traffic and mask users’ IP addresses; they do not inherently block malware, phishing, or denial-of-service attacks.
Yu-wen Huang   +6 more
semanticscholar   +1 more source

Study and implementation of a high-availability site-to-site VPN

International Journal of Scientific Research and Innovative Studies
Since the early days of the Internet until today, technology has evolved enormously. Since the advent of the Internet, information exchange has become commonplace; information is exchanged between one or more people; between a user and a server; between ...
Etumangele Tshitaka
semanticscholar   +1 more source

SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic

Electronics (Switzerland), 2022
Muhammad U S Khan   +2 more
exaly  

Hybrid End-to-End VPN Security Approach for Smart IoT Objects

Journal of Network and Computer Applications, 2020
Mazen Juma   +2 more
exaly  

Home - About - Disclaimer - Privacy