Results 21 to 30 of about 37,268 (180)

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

open access: yesSensors, 2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs).
Ayan Chatterjee, Andreas Prinz
doaj   +1 more source

Multicast traffic aggregation in MPLS-based VPN networks [PDF]

open access: yes, 2007
This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the aggregation of
Larrabeiti López, David   +3 more
core   +2 more sources

Development of Simulated Remote Monitoring and Operation System under Unstable Electric Power Supply

open access: yesJournal of ICT Research and Applications, 2020
In this study, a simulated remote monitoring and operation system was developed for an assumed remote area energy plant in a developing country with few skilled operators and unstable electric power supply.
Satoru Goto   +2 more
doaj   +1 more source

A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches

open access: yesApplied Sciences, 2023
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities.
Zhonghang Sui   +4 more
doaj   +1 more source

A ROS2 based communication architecture for control in collaborative and intelligent automation systems [PDF]

open access: yes, 2019
Collaborative robots are becoming part of intelligent automation systems in modern industry. Development and control of such systems differs from traditional automation methods and consequently leads to new challenges. Thankfully, Robot Operating System (
Bengtsson, Kristofer   +4 more
core   +3 more sources

A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller

open access: yesApplied Sciences, 2023
The rapid evolution of network infrastructure through the softwarization of network elements has led to an exponential increase in the attack surface, thereby increasing the complexity of threat protection.
Alberto Mozo   +5 more
doaj   +1 more source

Data and Service Security of GNSS Sensors Integrated with Cryptographic Module

open access: yesMicromachines, 2023
Navigation and positioning are of increasing importance because they are becoming a new form of infrastructure. To ensure both development and security, this study designed a technical innovation structure to upgrade the GNSS (Global Navigation Satellite
Changhui Xu   +4 more
doaj   +1 more source

Server resource dimensioning and routing of service function chain in NFV network architectures [PDF]

open access: yes, 2016
The Network Function Virtualization (NFV) technology aims at virtualizing the network service with the execution of the single service components in Virtual Machines activated on Commercial-off-the-shelf (COTS) servers.
Eramo, Vincenzo   +2 more
core   +3 more sources

A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges

open access: yesComputer Science Review
Alejandro Guerra-Manzanares   +2 more
openaire   +3 more sources

INTERIOR GATEWAY PROTOCOL ROUTING PERFORMANCE COMPARISON OF THE VIRTUAL PRIVATE NETWORK BASED ON MULTI PROTOCOL LABEL SWITCHING AND DIRECT-LINK BACKUPSED ON MPLS AND DIRECT-LINK BACKUP

open access: yesJurnal Ilmiah SINERGI, 2019
The stability and convergence time become an essential factor in network availability performance. Multiprotocol Label Switching (MPLS) is one of the Virtual Private Network (VPN) technologies that can support the quality of communication media on the ...
Ida Nurhaida   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy