Results 41 to 50 of about 14,303 (202)

Network layer access control for context-aware IPv6 applications [PDF]

open access: yes, 2003
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith   +5 more
core   +2 more sources

A Study and Evaluation of Network Security by Employing Decision‐Making Approach Based on Bipolar Complex Fuzzy Yager Aggregation Operators

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 6, Page 1703-1716, December 2025.
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam   +3 more
wiley   +1 more source

SD-WAN tunnel technology and network constuction

open access: yesDianxin kexue, 2021
The status of SD-WAN technology was introduced, the SD-WAN advantages with traditional line were compared.The basic technical features of SD-WAN, the software definition network controllers of SD-WAN, security encryption and tenant isolation, the SD-WAN ...
Jia NIU, Yongming YAN, Zhihua LIN
doaj   +2 more sources

Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol

open access: yesIEEE Access, 2023
Voice over Internet Protocols (VoIP) is an IP-based communication technology or commonly known as Internet Protocols (IP). In which, IP is currently widely used for mobile communication activities.
Setiyo Budiyanto, Dadang Gunawan
doaj   +1 more source

Enabling Practical IPsec authentication for the Internet [PDF]

open access: yes, 2006
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov.
Delgado Kloos, Carlos   +3 more
core   +3 more sources

A cross-layer architecture for satellite network security: CL-IPsec [PDF]

open access: yes, 2008
Cross-layer architectures (CLAs) are proposed to improve performance in networks where physical layer impairments are unpredictable and provision of security services may be challenging, as in satellite networks.
Fairhurst, G   +4 more
core   +2 more sources

Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks

open access: yesInternational Journal of Network Management, Volume 35, Issue 2, March/April 2025.
ABSTRACT Anomaly detection in multitenant virtual networks presents significant challenges due to the dynamic, ephemeral nature of virtualized environments and the complex traffic patterns they generate. This paper presents a definition of preferable positions within virtual networks to enhance anomaly detection efficacy.
Daniel Spiekermann
wiley   +1 more source

Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink

open access: yesСистеми обробки інформації, 2023
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін   +3 more
doaj   +1 more source

A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani   +3 more
wiley   +1 more source

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy