Results 21 to 30 of about 2,567 (170)
Implementation of a Virtual Private Network by Linux Operation System [PDF]
This paper deals with the implementation of a VPN in the Linux Operation System . Linux was found to be a very appealing candidate for such applications for a number of reasons .
Asmaa Al - Sammara
doaj +1 more source
CORBYS cognitive control architecture for robotic follower [PDF]
In this paper the novel generic cognitive robot control architecture CORBYS is presented. The objective of the CORBYS architecture is the integration of high-level cognitive modules to support robot functioning in dynamic environments including ...
Badii, Atta+8 more
core +1 more source
Pengontrol Lampu Jarak Jauh berbasis Web
Lampu merupakan salah satu peralatan elektronik yang digunakan untuk penerangan dengan memanfaatkan energi listrik. Sistem kontrol yang masih manual sering kali menjadi kendala menghidupkan dan mematikan lampu karena jarak antara saklar lampu satu dengan
Azis Surya Maheri, Heru Supriyono
doaj +1 more source
Firmware enhancements for BYOD-aware network security [PDF]
In today’s connected world, users migrate within a complex set of networks, including, but not limited to, 3G and 4G (LTE) services provided by mobile operators, Wi-Fi hotspots in private and public places, as well as wireless and/or wired LAN access in ...
Bottoni, Paolo+4 more
core +2 more sources
Evolution of quality assessment in SPL: a systematic mapping
Software product line (SPL) is one of the most recent and effective reuse approaches. SPL derives several products from the core artefacts. SPL engineering includes two processes: domain engineering, which identifies the common and variable features to develop the core artefacts, and application engineering, which reuses the core artefacts to derive ...
Luana Almeida Martins+3 more
wiley +1 more source
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha+16 more
core +2 more sources
Performance evaluation of INDECT security architecture
This paper evaluates the performance of the key elements of the security architecture developed by the INDECT project. In particular it first evaluates three different concurrent error detection mechanism (parity check, Berger code, and cyclic redundancy
Petr Machník+3 more
doaj +1 more source
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis [PDF]
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks.
arxiv +1 more source
PERBANDINGAN KINERJA DARI PROTOKOL VPN SSTP, OPENVPN DAN IPSEC BERBASIS MIKROTIK [PDF]
Informasi merupakan salah satu faktor pendukung keberhasilan bisnis dari suatu organisasi atau perusahaan. Namun, ada beberapa jenis informasi yang bersifat rahasia dan hanya boleh diakses oleh orang-orang yang berhak atas informasi ...
Doddy Ferdiansyah, DS+2 more
core +2 more sources
Diseño e integración de algoritmos criptográficos en sistemas empotrados sobre FPGA
En este trabajo se integran implementaciones hardware de algoritmos criptográficos a la biblioteca OpenSSL la cual es utilizadapor aplicaciones sobre el sistema operativo Linux para asegurar redes TCP/IP.
Alejandro Cabrera Aldaya+1 more
doaj +1 more source