Results 11 to 20 of about 2,567 (170)
Description of a low-cost picture archiving and communication system based on network-attached storage. [PDF]
Abstract High costs for installing, maintaining, and updating a standard picture archiving and communication system (PACS) can be prohibitive for small/medium‐sized veterinary facilities. The aims of this prospective, exploratory study were to describe the design, implementation, and author experiences for 1 year's use of a low‐cost PACS based on ...
Costanza D+4 more
europepmc +2 more sources
Reducing the acknowledgement frequency in IETF QUIC
This paper explores the use of the recently‐standardized IETF QUIC transport protocol with a focus on the implications on performance of using different acknowledgment policies on cellular, terrestrial and satellite networks. It finds that QUIC can be updated to minimize return capacity usage in GEO satellite paths and presents the trade‐offs around ...
Ana Custura+3 more
wiley +1 more source
Deploying an Inter‐European Quantum Network
Quantum key distribution (QKD) is today a mature consumer technology, but, even if many quantum networks have been already established in the world, Europe still has none. In this work a quantum network connecting Italy, Slovenia, and Croatia has been realized, the first‐ever among three countries, and representing the first step toward a European ...
Domenico Ribezzo+21 more
wiley +1 more source
Educational Information Refinement with Application Using Massive‐Scale Data Mining
In the manuscript, we propose a novel online learning mechanism based on educational data mining. By leveraging the computer‐assisted information‐based learning guidance platform, we collect the relevant information of students’ login platform and resource browsing.
Cai Song, Naeem Jan
wiley +1 more source
Model‐Based Grey‐Box Fuzzing of Network Protocols
The widely used network protocols play a crucial role in various systems. However, the protocol vulnerabilities caused by the design of the network protocol or its implementation by programmers lead to multiple security incidents and substantial losses. Hence, it is important to study the protocol fuzzing in order to ensure its correctness.
Yan Pan+4 more
wiley +1 more source
With the continuous deepening of enterprise management and market competition, the pressure of production and operation of enterprises is increasing, and it is urgent to improve the management level of enterprises. This paper mainly studies the decision optimization design of enterprise standardization management planning based on mobile network system.
Qiao Wang+3 more
wiley +1 more source
Website Fingerprinting Attacks Based on Homology Analysis
Website fingerprinting attacks allow attackers to determine the websites that users are linked to, by examining the encrypted traffic between the users and the anonymous network portals. Recent research demonstrated the feasibility of website fingerprinting attacks on Tor anonymous networks with only a few samples.
Maohua Guo, Jinlong Fei, Weiwei Liu
wiley +1 more source
Web‐Based Human‐Machine Interfaces of Industrial Controllers in Single‐Page Applications
Advances in conventional industrial controllers have led to new technologies such as multilanguage use, cross‐platform applications, and remote monitoring and control. However, the human‐machine interfaces (HMIs) of conventional industrial controllers and mobile devices cannot directly transmit instant messages to each other.
Shyr-Long Jeng+3 more
wiley +1 more source
On Man‐in‐the‐Middle Attack Risks of the VPN Gate Relay System
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer‐organized public VPN relay system launched in 2013.
Yunxiao Sun+4 more
wiley +1 more source
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing [PDF]
Many systems today rely heavily on virtual private network (VPN) technology to connect networks and protect their services on the Internet. While prior studies compare the performance of different implementations, they do not consider adversarial settings.
arxiv +1 more source