Results 31 to 40 of about 1,966 (130)
Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán +2 more
wiley +1 more source
One leak will sink a ship:WebRTC IP address leaks [PDF]
The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. This API causes a range of client IP addresses to become available to a visited website via JavaScript even if a VPN is in use.
Al-Fannah, Nasser Mohammed
core +2 more sources
An Extensive Classification of 5G Network Jamming Attacks
The paper introduces a pioneering taxonomy for 5G jamming attacks, meticulously crafted through diverse research methodologies, including literature review, case studies, incident database analysis, and network architecture assessment. This taxonomy is based on six dimensions: attack classification, attack techniques, jammer characteristics, impact and
Shreya Savadatti +4 more
wiley +1 more source
Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN [PDF]
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai dan handal, berbagai masalah justru muncul ketika internet tidak menjamin keamanan yang maksimal tanpa adanya metode-metode ...
Ridwan, M. (Muhammad) +2 more
core
PERBANDINGAN KINERJA DARI PROTOKOL VPN SSTP, OPENVPN DAN IPSEC BERBASIS MIKROTIK [PDF]
Informasi merupakan salah satu faktor pendukung keberhasilan bisnis dari suatu organisasi atau perusahaan. Namun, ada beberapa jenis informasi yang bersifat rahasia dan hanya boleh diakses oleh orang-orang yang berhak atas informasi ...
Doddy Ferdiansyah, DS +2 more
core +2 more sources
В роботі проведено дослідження ефективності роботи VPN різних типів в умовах затримок в електронних комунікаційних мережах. Розроблено та описано методику проведення досліджень, яка передбачає внесення затримки в тестову мережу та оцінку показників ...
Д. С. Комін +3 more
doaj +1 more source
Fronteras de seguridad en redes privadas virtuales (VPN) [PDF]
El presente trabajo de grado consiste en la elaboración de un documento basado en la investigación sobre la temática de redes privadas virtuales, terminología usada, nociones de enlaces de red, tipos de VPN y arquitecturas de VPNs, hasta el análisis de ...
Romero López, Camilo Ernesto +1 more
core
Penelitian ini membahas beberapa protokol VPN (Virtual Private Network), yaitu PPTP, SSTP, L2TP, dan IPsec, serta analisis metode autentikasi yang digunakan pada masing – masing protokol.
Annisa Dwi Prameswari +1 more
doaj +1 more source
Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo
Pengelolaan akun VPN dan konfigurasi port forwading di Mikrotik CHR (Cloud Hosted Router) menggunakan Winbox menjadi tugas yang rumit bagi pengguna awam yang tidak memiliki pengalaman dalam administrasi jaringan.
Poerbaningtyas E, Achmad Riyan Adi
doaj +1 more source
Based on combination of L2TP and IPSec VPN security technology research
This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security.
Ya-qin Fan, Chi Li, Chao Sun
openaire +1 more source

