Results 31 to 40 of about 2,951 (197)
On Man‐in‐the‐Middle Attack Risks of the VPN Gate Relay System
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer‐organized public VPN relay system launched in 2013.
Yunxiao Sun +4 more
wiley +1 more source
Comparative analysis of VPN protocols
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec.
Jerzy Antoniuk +1 more
doaj +1 more source
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet.
Antonio Francesco Gentile +4 more
doaj +1 more source
CORBYS cognitive control architecture for robotic follower [PDF]
In this paper the novel generic cognitive robot control architecture CORBYS is presented. The objective of the CORBYS architecture is the integration of high-level cognitive modules to support robot functioning in dynamic environments including ...
Badii, Atta +8 more
core +1 more source
Security vs Bandwidth: Performance Analysis Between IPsec and OpenVPN in Smart Grid [PDF]
Secure wireless communication is an essential element of smart grid systems. This enables distributed industrial Internet of Things (IoT) assets to be remotely controlled and monitored from the control centre. In this piece of work, we evaluate the impact of employing OpenVPN and IPsec on the bandwidth required for the operation of distribution assets ...
Ghanem, Kinan +5 more
openaire +2 more sources
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
Implementation of a Virtual Private Network by Linux Operation System [PDF]
This paper deals with the implementation of a VPN in the Linux Operation System . Linux was found to be a very appealing candidate for such applications for a number of reasons .
Asmaa Al - Sammara
doaj +1 more source
Network Security Analysis Simulation at the GCS in the UCAV to support the Indonesian Defense Area
An unmanned Combat Aerial Vehicle (UCAV) is an unmanned aircraft that has a serial control communication device that can be seen directly in real-time.
Bita Parga Zen +2 more
doaj +1 more source
Evolution of quality assessment in SPL: a systematic mapping
Software product line (SPL) is one of the most recent and effective reuse approaches. SPL derives several products from the core artefacts. SPL engineering includes two processes: domain engineering, which identifies the common and variable features to develop the core artefacts, and application engineering, which reuses the core artefacts to derive ...
Luana Almeida Martins +3 more
wiley +1 more source
Pengontrol Lampu Jarak Jauh berbasis Web
Lampu merupakan salah satu peralatan elektronik yang digunakan untuk penerangan dengan memanfaatkan energi listrik. Sistem kontrol yang masih manual sering kali menjadi kendala menghidupkan dan mematikan lampu karena jarak antara saklar lampu satu dengan
Azis Surya Maheri, Heru Supriyono
doaj +1 more source

