Results 41 to 50 of about 14,303 (202)
Network layer access control for context-aware IPv6 applications [PDF]
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith +5 more
core +2 more sources
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam +3 more
wiley +1 more source
SD-WAN tunnel technology and network constuction
The status of SD-WAN technology was introduced, the SD-WAN advantages with traditional line were compared.The basic technical features of SD-WAN, the software definition network controllers of SD-WAN, security encryption and tenant isolation, the SD-WAN ...
Jia NIU, Yongming YAN, Zhihua LIN
doaj +2 more sources
Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol
Voice over Internet Protocols (VoIP) is an IP-based communication technology or commonly known as Internet Protocols (IP). In which, IP is currently widely used for mobile communication activities.
Setiyo Budiyanto, Dadang Gunawan
doaj +1 more source
Enabling Practical IPsec authentication for the Internet [PDF]
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov.
Delgado Kloos, Carlos +3 more
core +3 more sources
A cross-layer architecture for satellite network security: CL-IPsec [PDF]
Cross-layer architectures (CLAs) are proposed to improve performance in networks where physical layer impairments are unpredictable and provision of security services may be challenging, as in satellite networks.
Fairhurst, G +4 more
core +2 more sources
Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks
ABSTRACT Anomaly detection in multitenant virtual networks presents significant challenges due to the dynamic, ephemeral nature of virtualized environments and the complex traffic patterns they generate. This paper presents a definition of preferable positions within virtual networks to enhance anomaly detection efficacy.
Daniel Spiekermann
wiley +1 more source
Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін +3 more
doaj +1 more source
A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani +3 more
wiley +1 more source
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi +8 more
wiley +1 more source

