Results 11 to 20 of about 1,966 (130)

The politicisation of internet privacy regulation

open access: yesEuropean Journal of Political Research, Volume 62, Issue 2, Page 530-550, May 2023., 2023
Abstract Despite a rich body of literature on politicisation, knowledge of this process and its driving forces remains limited. Specifically, little empirical analysis has been carried out to assess the impact of focusing events on politicisation within global and seemingly technical venues of policy‐making.
ELISE ANTOINE
wiley   +1 more source

A deep learning‐based framework to identify and characterise heterogeneous secure network traffic

open access: yesIET Information Security, Volume 17, Issue 2, Page 294-308, March 2023., 2023
This paper provides a lightweight 1D‐CNN model to distinguish different types of network traffic flows passing through a secure network. More specifically, it identifies and further characterizes the application type in complex network flows. Abstract The evergrowing diversity of encrypted and anonymous network traffic makes network management more ...
Faiz Ul Islam   +3 more
wiley   +1 more source

OpenBNG: Central office network functions on programmable data plane hardware

open access: yesInternational Journal of Network Management, Volume 31, Issue 1, January/February 2021., 2021
Summary Telecommunication providers continuously evolve their network infrastructure by increasing performance, lowering time to market, providing new services, and reducing the cost of the infrastructure and its operation. Network function virtualization (NFV) on commodity hardware offers an attractive, low‐cost platform to establish innovations much ...
Ralf Kundel   +10 more
wiley   +1 more source

Small‐Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Developing specialized cloud‐based and open‐source testbeds is a practical approach to investigate network slicing functionalities in the fifth‐generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost‐efficient and small‐scale testbeds that partially or fully deploy network slicing.
Ali Esmaeily   +2 more
wiley   +1 more source

Cyber‐Security Assessment of Industry 4.0 Enabled Mechatronic System

open access: yesComplexity, Volume 2021, Issue 1, 2021., 2021
This paper reports on development of a laboratory set‐up, for testing the concept and the components of Industry 4.0 enabled mechatronic system. A simple mock manufacturing lane is connected to a collaborating robot. There are three different programmable logic controllers (PLC) and various other elements which need to talk to each other using a ...
Piotr Kotuszewski   +10 more
wiley   +1 more source

On Man‐in‐the‐Middle Attack Risks of the VPN Gate Relay System

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer‐organized public VPN relay system launched in 2013.
Yunxiao Sun   +4 more
wiley   +1 more source

Nomadic input on mobile devices: the influence of touch input technique and walking speed on performance and offset modeling [PDF]

open access: yes, 2015
In everyday life people use their mobile phones on-the-go with different walking speeds and with different touch input techniques. Unfortunately, much of the published research in mobile interaction does not quantify the influence of these variables.
Murray-Smith, Roderick, Musić, Josip
core   +1 more source

A Survey of Key Technologies for Constructing Network Covert Channel

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed.
Jing Tian   +4 more
wiley   +1 more source

A Tunnel-aware Language for Network Packet Filtering [PDF]

open access: yes, 2010
—While in computer networks the number of possible protocol encapsulations is growing day after day, network administrators face ever increasing difficulties in selecting accurately the traffic they need to inspect.
Ciminiera, Luigi   +4 more
core   +2 more sources

PPTP VPN and L2TP/IPsec VPN Performance as Voice Data Security in VoIP

open access: yesIarjset, 2022
Martono Dwi Atmadja   +2 more
exaly   +2 more sources

Home - About - Disclaimer - Privacy