RANCANG BANGUN JARINGAN ENTERPRISE DENGAN VIRTUAL PRIVATE NETWORK DAN CENTRAL AUTHENTICATION SYSTEM PADA PABRIK GULA PT. PERKEBUNAN NUSANTARA X (PERSERO) [PDF]
Dalam proses produksi gula, perangkat lunak sistem informasi cukup berpengaruh besar dalam peningkatan hasil produksi. Perangkat lunak yang digunakan sangat mempengaruhi keputusan dari setiap proses produksi dan mengontrol perhitungan serta laporan ...
Ahmad, Aziz
core
A Biobanking System for Diagnostic Images: Architecture Development, COVID-19-Related Use Cases, and Performance Evaluation. [PDF]
Esposito G+6 more
europepmc +1 more source
Automatic Depression Prediction Using Internet Traffic Characteristics on Smartphones. [PDF]
Yue C+9 more
europepmc +1 more source
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering [PDF]
AI assistants for coding are on the rise. However one of the reasons developers and companies avoid harnessing their full potential is the questionable security of the generated code. This paper first reviews the current state-of-the-art and identifies areas for improvement on this issue.
arxiv
VPN Based on QUIC Protocol [PDF]
Tato bakalářská práce zkoumá použitelnost protokolu QUIC v prostředí virtuálních privátních sítí (VPN). Dokumentuje proces návrhu a implementace nové VPN založené na protokolu QUIC a porovnává ji s existujícími VPN jako OpenVPN a WireGuard pomocí série ...
Jakub Kubík
core
Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms [PDF]
Fingerprinting is a technique used to create behavioral profiles of systems to identify threats and weaknesses. When applied to cryptographic primitives and network protocols, it can be exploited by attackers for denial-of-service, key recovery, or downgrade attacks.
arxiv
Establishment and Application of a Patient-Ventilator Asynchrony Remote Network Platform for ICU Mechanical Ventilation: A Retrospective Study. [PDF]
Su L+8 more
europepmc +1 more source
Securing Session Initiation Protocol. [PDF]
Younes O, Albalawi U.
europepmc +1 more source
Analisis Keamanan Komunikasi VoIP Server Portable Dilengkapi OpenVPN Menggunakan Linux Asterisk
Rapawuli Eko Putro+1 more
openalex +2 more sources
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic. [PDF]
Yoshimura N+3 more
europepmc +1 more source