Results 71 to 80 of about 14,303 (202)

Conformance test suite for implementations of the security protocol suite IPsec v2

open access: yesТруды Института системного программирования РАН, 2018
The paper presents conformance test suite for new Internet Protocol Security Suite IPsec v2. The test suite was constructed by means of the UniTESK automated testing technology and its implementation, CTESK toolkit.The work was done in the Institute for ...
A. V. Nikeshin   +2 more
doaj  

An Extensive Classification of 5G Network Jamming Attacks

open access: yesSecurity and Communication Networks, Volume 2024, Issue 1, 2024.
The paper introduces a pioneering taxonomy for 5G jamming attacks, meticulously crafted through diverse research methodologies, including literature review, case studies, incident database analysis, and network architecture assessment. This taxonomy is based on six dimensions: attack classification, attack techniques, jammer characteristics, impact and
Shreya Savadatti   +4 more
wiley   +1 more source

Enhanced Light‐Gradient Boosting Machine (GBM)‐Based Artificial Intelligence‐Blockchain‐Based Telesurgery in Sixth Generation Communication Using Optimization Concept

open access: yesJournal of Electrical and Computer Engineering, Volume 2024, Issue 1, 2024.
Telesurgery and robotic surgery are two real‐time mission‐critical applications where Artificial Intelligence (AI) has a lot of perspective. In this work, a blockchain‐ and AI‐powered telesurgery system for 6 G communication is suggested, which describes a transparent, safe, self‐managing, and trustworthy structure having massive Ultra‐Reliable Low ...
Punitha S., Preetha K. S., Shonak Bansal
wiley   +1 more source

Peningkatan Keamanan Jaringan Virtual Private Network Menggunakan Protokol IKE/IPSEC Berbasis Mikrotik

open access: yesJournal of Information and Technology
Penelitian ini membahas beberapa protokol VPN (Virtual Private Network), yaitu PPTP, SSTP, L2TP, dan IPsec, serta analisis metode autentikasi yang digunakan pada masing – masing protokol.
Annisa Dwi Prameswari   +1 more
doaj   +1 more source

An Overview of Recent Wireless Technologies for IoT‐Enabled Smart Grids

open access: yesJournal of Electrical and Computer Engineering, Volume 2024, Issue 1, 2024.
Smart Grid is a way of providing bidirectional energy flow with the integration of latest communication technologies and advanced control methods to overcome the issues associated with the current power grid such as unidirectional power flow, resource wastage, reliability, security, enhanced quality, and increasing demand of energy.
Rashiqa Abdul Salam   +6 more
wiley   +1 more source

An Overview of Secure Communications for the Internet of Things [PDF]

open access: yesInternational Journal of Information and Communication Technology Research
As an emerging technology that combines both digital and physical realms, access to information technology has expanded (IoT) the Internet of Things. The Internet of Things, as it becomes more pervasive, will overshadow human life as much as possible ...
Seyed Ali Zoljalali Moghaddam   +1 more
doaj  

A new approach to header compression in secure communications

open access: yesJournal of Telecommunications and Information Technology, 2006
The paper presents a new header compression mechanism for the IPv6 protocol. Its main benefit is the re- duction of the overhead caused by IPSec tunnel mode which enlarges datagrams in order to provide security services such as authentication and ...
Christoph Karg, Martin Lies
doaj   +1 more source

Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud [PDF]

open access: yes, 2012
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources.
Aslam, Mudassar   +3 more
core   +1 more source

Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]

open access: yes, 2008
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid   +5 more
core  

Description and Experience of the Clinical Testbeds [PDF]

open access: yes, 2002
This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies in use at these ...
Kalra, D., Lawrentowski, A.
core  

Home - About - Disclaimer - Privacy