Results 21 to 30 of about 37,268 (180)
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs).
Ayan Chatterjee, Andreas Prinz
doaj +1 more source
Multicast traffic aggregation in MPLS-based VPN networks [PDF]
This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the aggregation of
Larrabeiti López, David +3 more
core +2 more sources
Development of Simulated Remote Monitoring and Operation System under Unstable Electric Power Supply
In this study, a simulated remote monitoring and operation system was developed for an assumed remote area energy plant in a developing country with few skilled operators and unstable electric power supply.
Satoru Goto +2 more
doaj +1 more source
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities.
Zhonghang Sui +4 more
doaj +1 more source
A ROS2 based communication architecture for control in collaborative and intelligent automation systems [PDF]
Collaborative robots are becoming part of intelligent automation systems in modern industry. Development and control of such systems differs from traditional automation methods and consequently leads to new challenges. Thankfully, Robot Operating System (
Bengtsson, Kristofer +4 more
core +3 more sources
A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller
The rapid evolution of network infrastructure through the softwarization of network elements has led to an exponential increase in the attack surface, thereby increasing the complexity of threat protection.
Alberto Mozo +5 more
doaj +1 more source
Data and Service Security of GNSS Sensors Integrated with Cryptographic Module
Navigation and positioning are of increasing importance because they are becoming a new form of infrastructure. To ensure both development and security, this study designed a technical innovation structure to upgrade the GNSS (Global Navigation Satellite
Changhui Xu +4 more
doaj +1 more source
Server resource dimensioning and routing of service function chain in NFV network architectures [PDF]
The Network Function Virtualization (NFV) technology aims at virtualizing the network service with the execution of the single service components in Virtual Machines activated on Commercial-off-the-shelf (COTS) servers.
Eramo, Vincenzo +2 more
core +3 more sources
The stability and convergence time become an essential factor in network availability performance. Multiprotocol Label Switching (MPLS) is one of the Virtual Private Network (VPN) technologies that can support the quality of communication media on the ...
Ida Nurhaida +3 more
doaj +1 more source

