Results 21 to 30 of about 2,910 (182)
Comparative analysis of VPN protocols
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec.
Jerzy Antoniuk +1 more
doaj +1 more source
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet.
Antonio Francesco Gentile +4 more
doaj +1 more source
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
PERBANDINGAN KINERJA DARI PROTOKOL VPN SSTP, OPENVPN DAN IPSEC BERBASIS MIKROTIK [PDF]
Informasi merupakan salah satu faktor pendukung keberhasilan bisnis dari suatu organisasi atau perusahaan. Namun, ada beberapa jenis informasi yang bersifat rahasia dan hanya boleh diakses oleh orang-orang yang berhak atas informasi ...
Doddy Ferdiansyah, DS +2 more
core +2 more sources
CORBYS cognitive control architecture for robotic follower [PDF]
In this paper the novel generic cognitive robot control architecture CORBYS is presented. The objective of the CORBYS architecture is the integration of high-level cognitive modules to support robot functioning in dynamic environments including ...
Badii, Atta +8 more
core +1 more source
Implementation of a Virtual Private Network by Linux Operation System [PDF]
This paper deals with the implementation of a VPN in the Linux Operation System . Linux was found to be a very appealing candidate for such applications for a number of reasons .
Asmaa Al - Sammara
doaj +1 more source
Pengontrol Lampu Jarak Jauh berbasis Web
Lampu merupakan salah satu peralatan elektronik yang digunakan untuk penerangan dengan memanfaatkan energi listrik. Sistem kontrol yang masih manual sering kali menjadi kendala menghidupkan dan mematikan lampu karena jarak antara saklar lampu satu dengan
Azis Surya Maheri, Heru Supriyono
doaj +1 more source
Network Security Analysis Simulation at the GCS in the UCAV to support the Indonesian Defense Area
An unmanned Combat Aerial Vehicle (UCAV) is an unmanned aircraft that has a serial control communication device that can be seen directly in real-time.
Bita Parga Zen +2 more
doaj +1 more source
Evolution of quality assessment in SPL: a systematic mapping
Software product line (SPL) is one of the most recent and effective reuse approaches. SPL derives several products from the core artefacts. SPL engineering includes two processes: domain engineering, which identifies the common and variable features to develop the core artefacts, and application engineering, which reuses the core artefacts to derive ...
Luana Almeida Martins +3 more
wiley +1 more source
OpenVPN access server merupakan salah satu solusi VPN yang sangat cocok diterapkan untuk perusahaan maupun personal karena mudah dikonfigurasi dan bisa dipasang pada server secara on-premise. Walaupun pengguna sudah menggunakan protokol OpenVPN namun masih ada celah keamanan pada sisi DNS apabila masih menggunakan DNS milik ISP yang menerapkan banyak ...
openaire +2 more sources

