Results 91 to 100 of about 2,567 (170)

RANCANG BANGUN JARINGAN ENTERPRISE DENGAN VIRTUAL PRIVATE NETWORK DAN CENTRAL AUTHENTICATION SYSTEM PADA PABRIK GULA PT. PERKEBUNAN NUSANTARA X (PERSERO) [PDF]

open access: yes, 2011
Dalam proses produksi gula, perangkat lunak sistem informasi cukup berpengaruh besar dalam peningkatan hasil produksi. Perangkat lunak yang digunakan sangat mempengaruhi keputusan dari setiap proses produksi dan mengontrol perhitungan serta laporan ...
Ahmad, Aziz
core  

Automatic Depression Prediction Using Internet Traffic Characteristics on Smartphones. [PDF]

open access: yesSmart Health (Amst), 2020
Yue C   +9 more
europepmc   +1 more source

Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering [PDF]

open access: yesarXiv
AI assistants for coding are on the rise. However one of the reasons developers and companies avoid harnessing their full potential is the questionable security of the generated code. This paper first reviews the current state-of-the-art and identifies areas for improvement on this issue.
arxiv  

VPN Based on QUIC Protocol [PDF]

open access: yes
Tato bakalářská práce zkoumá použitelnost protokolu QUIC v prostředí virtuálních privátních sítí (VPN). Dokumentuje proces návrhu a implementace nové VPN založené na protokolu QUIC a porovnává ji s existujícími VPN jako OpenVPN a WireGuard pomocí série ...
Jakub Kubík
core  

Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms [PDF]

open access: yesarXiv
Fingerprinting is a technique used to create behavioral profiles of systems to identify threats and weaknesses. When applied to cryptographic primitives and network protocols, it can be exploited by attackers for denial-of-service, key recovery, or downgrade attacks.
arxiv  

Securing Session Initiation Protocol. [PDF]

open access: yesSensors (Basel), 2022
Younes O, Albalawi U.
europepmc   +1 more source

Home - About - Disclaimer - Privacy