Results 31 to 40 of about 1,966 (130)

Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán   +2 more
wiley   +1 more source

One leak will sink a ship:WebRTC IP address leaks [PDF]

open access: yes, 2017
The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. This API causes a range of client IP addresses to become available to a visited website via JavaScript even if a VPN is in use.
Al-Fannah, Nasser Mohammed
core   +2 more sources

An Extensive Classification of 5G Network Jamming Attacks

open access: yesSecurity and Communication Networks, Volume 2024, Issue 1, 2024.
The paper introduces a pioneering taxonomy for 5G jamming attacks, meticulously crafted through diverse research methodologies, including literature review, case studies, incident database analysis, and network architecture assessment. This taxonomy is based on six dimensions: attack classification, attack techniques, jammer characteristics, impact and
Shreya Savadatti   +4 more
wiley   +1 more source

Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN [PDF]

open access: yes, 2015
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai dan handal, berbagai masalah justru muncul ketika internet tidak menjamin keamanan yang maksimal tanpa adanya metode-metode ...
Ridwan, M. (Muhammad)   +2 more
core  

PERBANDINGAN KINERJA DARI PROTOKOL VPN SSTP, OPENVPN DAN IPSEC BERBASIS MIKROTIK [PDF]

open access: yes, 2016
Informasi merupakan salah satu faktor pendukung keberhasilan bisnis dari suatu organisasi atau perusahaan. Namun, ada beberapa jenis informasi yang bersifat rahasia dan hanya boleh diakses oleh orang-orang yang berhak atas informasi ...
Doddy Ferdiansyah, DS   +2 more
core   +2 more sources

Дослідження ефективності функціонування Site-to-Site VPN в умовах затримок в електронних комунікаційних мережах

open access: yesСистеми обробки інформації
В роботі проведено дослідження ефективності роботи VPN різних типів в умовах затримок в електронних комунікаційних мережах. Розроблено та описано методику проведення досліджень, яка передбачає внесення затримки в тестову мережу та оцінку показників ...
Д. С. Комін   +3 more
doaj   +1 more source

Fronteras de seguridad en redes privadas virtuales (VPN) [PDF]

open access: yes, 2016
El presente trabajo de grado consiste en la elaboración de un documento basado en la investigación sobre la temática de redes privadas virtuales, terminología usada, nociones de enlaces de red, tipos de VPN y arquitecturas de VPNs, hasta el análisis de ...
Romero López, Camilo Ernesto   +1 more
core  

Peningkatan Keamanan Jaringan Virtual Private Network Menggunakan Protokol IKE/IPSEC Berbasis Mikrotik

open access: yesJournal of Information and Technology
Penelitian ini membahas beberapa protokol VPN (Virtual Private Network), yaitu PPTP, SSTP, L2TP, dan IPsec, serta analisis metode autentikasi yang digunakan pada masing – masing protokol.
Annisa Dwi Prameswari   +1 more
doaj   +1 more source

Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo

open access: yesJournal of Information and Technology
Pengelolaan akun VPN dan konfigurasi port forwading di Mikrotik CHR (Cloud Hosted Router) menggunakan Winbox menjadi tugas yang rumit bagi pengguna awam yang tidak memiliki pengalaman dalam administrasi jaringan.
Poerbaningtyas E, Achmad Riyan Adi
doaj   +1 more source

Based on combination of L2TP and IPSec VPN security technology research

open access: yesJournal of Networks, 2012
This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security.
Ya-qin Fan, Chi Li, Chao Sun
openaire   +1 more source

Home - About - Disclaimer - Privacy