Results 21 to 30 of about 2,910 (182)

Comparative analysis of VPN protocols

open access: yesJournal of Computer Sciences Institute, 2023
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec.
Jerzy Antoniuk   +1 more
doaj   +1 more source

A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment

open access: yesFuture Internet, 2022
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet.
Antonio Francesco Gentile   +4 more
doaj   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

PERBANDINGAN KINERJA DARI PROTOKOL VPN SSTP, OPENVPN DAN IPSEC BERBASIS MIKROTIK [PDF]

open access: yes, 2016
Informasi merupakan salah satu faktor pendukung keberhasilan bisnis dari suatu organisasi atau perusahaan. Namun, ada beberapa jenis informasi yang bersifat rahasia dan hanya boleh diakses oleh orang-orang yang berhak atas informasi ...
Doddy Ferdiansyah, DS   +2 more
core   +2 more sources

CORBYS cognitive control architecture for robotic follower [PDF]

open access: yes, 2013
In this paper the novel generic cognitive robot control architecture CORBYS is presented. The objective of the CORBYS architecture is the integration of high-level cognitive modules to support robot functioning in dynamic environments including ...
Badii, Atta   +8 more
core   +1 more source

Implementation of a Virtual Private Network by Linux Operation System [PDF]

open access: yesEngineering and Technology Journal, 2005
This paper deals with the implementation of a VPN in the Linux Operation System . Linux was found to be a very appealing candidate for such applications for a number of reasons .
Asmaa Al - Sammara
doaj   +1 more source

Pengontrol Lampu Jarak Jauh berbasis Web

open access: yesEmitor: Jurnal Teknik Elektro, 2019
Lampu merupakan salah satu peralatan elektronik yang digunakan untuk penerangan dengan memanfaatkan energi listrik. Sistem kontrol yang masih manual sering kali menjadi kendala menghidupkan dan mematikan lampu karena jarak antara saklar lampu satu dengan
Azis Surya Maheri, Heru Supriyono
doaj   +1 more source

Network Security Analysis Simulation at the GCS in the UCAV to support the Indonesian Defense Area

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
An unmanned Combat Aerial Vehicle (UCAV) is an unmanned aircraft that has a serial control communication device that can be seen directly in real-time.
Bita Parga Zen   +2 more
doaj   +1 more source

Evolution of quality assessment in SPL: a systematic mapping

open access: yesIET Software, Volume 14, Issue 6, Page 572-581, December 2020., 2020
Software product line (SPL) is one of the most recent and effective reuse approaches. SPL derives several products from the core artefacts. SPL engineering includes two processes: domain engineering, which identifies the common and variable features to develop the core artefacts, and application engineering, which reuses the core artefacts to derive ...
Luana Almeida Martins   +3 more
wiley   +1 more source

Implementasi Keamanan Jalur Internet Menggunakan IP Tunneling pada OpenVPN Access Server dengan Protokol OpenVPN dan Protokol DNS Over HTTPS

open access: yesJurnal Syntax Admiration, 2021
OpenVPN access server merupakan salah satu solusi VPN yang sangat cocok diterapkan untuk perusahaan maupun personal karena mudah dikonfigurasi dan bisa dipasang pada server secara on-premise. Walaupun pengguna sudah menggunakan protokol OpenVPN namun masih ada celah keamanan pada sisi DNS apabila masih menggunakan DNS milik ISP yang menerapkan banyak ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy