Results 21 to 30 of about 2,951 (197)
SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi +3 more
doaj +1 more source
Reducing the acknowledgement frequency in IETF QUIC
This paper explores the use of the recently‐standardized IETF QUIC transport protocol with a focus on the implications on performance of using different acknowledgment policies on cellular, terrestrial and satellite networks. It finds that QUIC can be updated to minimize return capacity usage in GEO satellite paths and presents the trade‐offs around ...
Ana Custura +3 more
wiley +1 more source
Deploying an Inter‐European Quantum Network
Quantum key distribution (QKD) is today a mature consumer technology, but, even if many quantum networks have been already established in the world, Europe still has none. In this work a quantum network connecting Italy, Slovenia, and Croatia has been realized, the first‐ever among three countries, and representing the first step toward a European ...
Domenico Ribezzo +21 more
wiley +1 more source
Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін +3 more
doaj +1 more source
Educational Information Refinement with Application Using Massive‐Scale Data Mining
In the manuscript, we propose a novel online learning mechanism based on educational data mining. By leveraging the computer‐assisted information‐based learning guidance platform, we collect the relevant information of students’ login platform and resource browsing.
Cai Song, Naeem Jan
wiley +1 more source
Model‐Based Grey‐Box Fuzzing of Network Protocols
The widely used network protocols play a crucial role in various systems. However, the protocol vulnerabilities caused by the design of the network protocol or its implementation by programmers lead to multiple security incidents and substantial losses. Hence, it is important to study the protocol fuzzing in order to ensure its correctness.
Yan Pan +4 more
wiley +1 more source
With the continuous deepening of enterprise management and market competition, the pressure of production and operation of enterprises is increasing, and it is urgent to improve the management level of enterprises. This paper mainly studies the decision optimization design of enterprise standardization management planning based on mobile network system.
Qiao Wang +3 more
wiley +1 more source
Tracing the Network Traffic Fingerprinting Techniques of OpenVPN [PDF]
Gene Tsudik
openalex +2 more sources
Website Fingerprinting Attacks Based on Homology Analysis
Website fingerprinting attacks allow attackers to determine the websites that users are linked to, by examining the encrypted traffic between the users and the anonymous network portals. Recent research demonstrated the feasibility of website fingerprinting attacks on Tor anonymous networks with only a few samples.
Maohua Guo, Jinlong Fei, Weiwei Liu
wiley +1 more source
Web‐Based Human‐Machine Interfaces of Industrial Controllers in Single‐Page Applications
Advances in conventional industrial controllers have led to new technologies such as multilanguage use, cross‐platform applications, and remote monitoring and control. However, the human‐machine interfaces (HMIs) of conventional industrial controllers and mobile devices cannot directly transmit instant messages to each other.
Shyr-Long Jeng +3 more
wiley +1 more source

