Results 21 to 30 of about 2,951 (197)

SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network

open access: yesJournal of Computing Research and Innovation, 2021
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Reducing the acknowledgement frequency in IETF QUIC

open access: yesInternational Journal of Satellite Communications and Networking, Volume 41, Issue 4, Page 315-330, July/August 2023., 2023
This paper explores the use of the recently‐standardized IETF QUIC transport protocol with a focus on the implications on performance of using different acknowledgment policies on cellular, terrestrial and satellite networks. It finds that QUIC can be updated to minimize return capacity usage in GEO satellite paths and presents the trade‐offs around ...
Ana Custura   +3 more
wiley   +1 more source

Deploying an Inter‐European Quantum Network

open access: yesAdvanced Quantum Technologies, Volume 6, Issue 2, February 2023., 2023
Quantum key distribution (QKD) is today a mature consumer technology, but, even if many quantum networks have been already established in the world, Europe still has none. In this work a quantum network connecting Italy, Slovenia, and Croatia has been realized, the first‐ever among three countries, and representing the first step toward a European ...
Domenico Ribezzo   +21 more
wiley   +1 more source

Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink

open access: yesСистеми обробки інформації, 2023
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін   +3 more
doaj   +1 more source

Educational Information Refinement with Application Using Massive‐Scale Data Mining

open access: yesMathematical Problems in Engineering, Volume 2022, Issue 1, 2022., 2022
In the manuscript, we propose a novel online learning mechanism based on educational data mining. By leveraging the computer‐assisted information‐based learning guidance platform, we collect the relevant information of students’ login platform and resource browsing.
Cai Song, Naeem Jan
wiley   +1 more source

Model‐Based Grey‐Box Fuzzing of Network Protocols

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The widely used network protocols play a crucial role in various systems. However, the protocol vulnerabilities caused by the design of the network protocol or its implementation by programmers lead to multiple security incidents and substantial losses. Hence, it is important to study the protocol fuzzing in order to ensure its correctness.
Yan Pan   +4 more
wiley   +1 more source

Decision‐Making Optimization Design of Enterprise Standardization Management Planning Based on Mobile Network System

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
With the continuous deepening of enterprise management and market competition, the pressure of production and operation of enterprises is increasing, and it is urgent to improve the management level of enterprises. This paper mainly studies the decision optimization design of enterprise standardization management planning based on mobile network system.
Qiao Wang   +3 more
wiley   +1 more source

Website Fingerprinting Attacks Based on Homology Analysis

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Website fingerprinting attacks allow attackers to determine the websites that users are linked to, by examining the encrypted traffic between the users and the anonymous network portals. Recent research demonstrated the feasibility of website fingerprinting attacks on Tor anonymous networks with only a few samples.
Maohua Guo, Jinlong Fei, Weiwei Liu
wiley   +1 more source

Web‐Based Human‐Machine Interfaces of Industrial Controllers in Single‐Page Applications

open access: yesMobile Information Systems, Volume 2021, Issue 1, 2021., 2021
Advances in conventional industrial controllers have led to new technologies such as multilanguage use, cross‐platform applications, and remote monitoring and control. However, the human‐machine interfaces (HMIs) of conventional industrial controllers and mobile devices cannot directly transmit instant messages to each other.
Shyr-Long Jeng   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy