Results 21 to 30 of about 2,567 (170)

Implementation of a Virtual Private Network by Linux Operation System [PDF]

open access: yesEngineering and Technology Journal, 2005
This paper deals with the implementation of a VPN in the Linux Operation System . Linux was found to be a very appealing candidate for such applications for a number of reasons .
Asmaa Al - Sammara
doaj   +1 more source

CORBYS cognitive control architecture for robotic follower [PDF]

open access: yes, 2014
In this paper the novel generic cognitive robot control architecture CORBYS is presented. The objective of the CORBYS architecture is the integration of high-level cognitive modules to support robot functioning in dynamic environments including ...
Badii, Atta   +8 more
core   +1 more source

Pengontrol Lampu Jarak Jauh berbasis Web

open access: yesEmitor: Jurnal Teknik Elektro, 2019
Lampu merupakan salah satu peralatan elektronik yang digunakan untuk penerangan dengan memanfaatkan energi listrik. Sistem kontrol yang masih manual sering kali menjadi kendala menghidupkan dan mematikan lampu karena jarak antara saklar lampu satu dengan
Azis Surya Maheri, Heru Supriyono
doaj   +1 more source

Firmware enhancements for BYOD-aware network security [PDF]

open access: yes, 2017
In today’s connected world, users migrate within a complex set of networks, including, but not limited to, 3G and 4G (LTE) services provided by mobile operators, Wi-Fi hotspots in private and public places, as well as wireless and/or wired LAN access in ...
Bottoni, Paolo   +4 more
core   +2 more sources

Evolution of quality assessment in SPL: a systematic mapping

open access: yesIET Software, Volume 14, Issue 6, Page 572-581, December 2020., 2020
Software product line (SPL) is one of the most recent and effective reuse approaches. SPL derives several products from the core artefacts. SPL engineering includes two processes: domain engineering, which identifies the common and variable features to develop the core artefacts, and application engineering, which reuses the core artefacts to derive ...
Luana Almeida Martins   +3 more
wiley   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +2 more sources

Performance evaluation of INDECT security architecture

open access: yesIteckne, 2018
This paper evaluates the performance of the key elements of the security architecture developed by the INDECT project. In particular it first evaluates three different concurrent error detection mechanism (parity check, Berger code, and cyclic redundancy
Petr Machník   +3 more
doaj   +1 more source

Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis [PDF]

open access: yesInternational Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011, 97-113, 2012
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks.
arxiv   +1 more source

PERBANDINGAN KINERJA DARI PROTOKOL VPN SSTP, OPENVPN DAN IPSEC BERBASIS MIKROTIK [PDF]

open access: yes, 2016
Informasi merupakan salah satu faktor pendukung keberhasilan bisnis dari suatu organisasi atau perusahaan. Namun, ada beberapa jenis informasi yang bersifat rahasia dan hanya boleh diakses oleh orang-orang yang berhak atas informasi ...
Doddy Ferdiansyah, DS   +2 more
core   +2 more sources

Diseño e integración de algoritmos criptográficos en sistemas empotrados sobre FPGA

open access: yesRevista Ingeniería Electrónica, Automática y Comunicaciones, 2013
En este trabajo se integran implementaciones hardware de algoritmos criptográficos a la biblioteca OpenSSL la cual es utilizadapor aplicaciones sobre el sistema operativo Linux para asegurar redes TCP/IP.
Alejandro Cabrera Aldaya   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy