Results 31 to 40 of about 2,567 (170)

Recommendations on using VPN over SATCOM [PDF]

open access: yesarXiv, 2021
VPN are a secured tunnel that help service providers to exchange data over non-secured networks. There is a large variety of VPN solutions that have variable deployment impacts on the target architecture as well as performance limitations or opportunities.
arxiv  

Aplikasi Pembelajaran Menggunakan Web Server Raspberry Pi

open access: yesKomputika, 2018
Salah satu aplikasi pada website yang dibuat dalam penelitian ini adalah aplikasi pembelajaran. Aplikasi pembelajaran ini sebagai wadah penampung soal-soal pelajaran atau wadah dokumentasi soal-soal yang pernah diberikan kepada para siswa.
Syahrul Syahrul, Muhammad Syaiul Haq
doaj   +1 more source

Scalability evaluation of VPN technologies for secure container networking [PDF]

open access: yes, 2019
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for ...
De Turck, Filip   +3 more
core   +1 more source

Security architecture for law enforcement agencies [PDF]

open access: yes, 2014
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies.
Manuel Urueña   +3 more
core   +5 more sources

DESIGN AND EVALUATION OF A VIRTUAL PRIVATE NETWORK ARCHITECTURE FOR COLLABORATING SPECIALIST USERS

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2015
The expansion of communication systems is the undeniable advantage of the most contemporary digital technologies. However, when a specialist user such as an inventor or an idea owner communicates through a communication system, their intellects are ...
Akram Kargar Raeespour   +1 more
doaj   +1 more source

ML-based tunnel detection and tunneled application classification [PDF]

open access: yesarXiv, 2022
Encrypted tunneling protocols are widely used. Beyond business and personal uses, malicious actors also deploy tunneling to hinder the detection of Command and Control and data exfiltration. A common approach to maintain visibility on tunneling is to rely on network traffic metadata and machine learning to analyze tunnel occurrence without actually ...
arxiv  

OSHI - Open Source Hybrid IP/SDN networking (and its emulation on Mininet and on distributed SDN testbeds)

open access: yes, 2014
The introduction of SDN in IP backbones requires the coexistence of regular IP forwarding and SDN based forwarding. The former is typically applied to best effort Internet traffic, the latter can be used for different types of advanced services (VPNs ...
Gerola, Matteo   +5 more
core   +1 more source

DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks [PDF]

open access: yesarXiv, 2021
DDoS attacks remain a major security threat to the continuous operation of Internet edge infrastructures, web services, and cloud platforms. While a large body of research focuses on DDoS detection and protection, to date we ultimately failed to eradicate DDoS altogether.
arxiv  

A LoRaWAN Testbed Design for Supporting Critical Situations: Prototype and Evaluation

open access: yesWireless Communications and Mobile Computing, Volume 2019, Issue 1, 2019., 2019
The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. A massive number of sensors and actuators are expected to emerge, requiring new wireless technologies that can extend their battery life and can cover large
Jorge Navarro-Ortiz   +5 more
wiley   +1 more source

Software‐Defined Edge Cloud Framework for Resilient Multitenant Applications

open access: yesWireless Communications and Mobile Computing, Volume 2019, Issue 1, 2019., 2019
Edge application’s distributed nature presents significant challenges for developers in orchestrating and managing the multitenant applications. In this paper, we propose a practical edge cloud software framework for deploying multitenant distributed smart applications.
Kaikai Liu   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy