Results 31 to 40 of about 2,567 (170)
Recommendations on using VPN over SATCOM [PDF]
VPN are a secured tunnel that help service providers to exchange data over non-secured networks. There is a large variety of VPN solutions that have variable deployment impacts on the target architecture as well as performance limitations or opportunities.
arxiv
Aplikasi Pembelajaran Menggunakan Web Server Raspberry Pi
Salah satu aplikasi pada website yang dibuat dalam penelitian ini adalah aplikasi pembelajaran. Aplikasi pembelajaran ini sebagai wadah penampung soal-soal pelajaran atau wadah dokumentasi soal-soal yang pernah diberikan kepada para siswa.
Syahrul Syahrul, Muhammad Syaiul Haq
doaj +1 more source
Scalability evaluation of VPN technologies for secure container networking [PDF]
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for ...
De Turck, Filip+3 more
core +1 more source
Security architecture for law enforcement agencies [PDF]
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies.
Manuel Urueña+3 more
core +5 more sources
DESIGN AND EVALUATION OF A VIRTUAL PRIVATE NETWORK ARCHITECTURE FOR COLLABORATING SPECIALIST USERS
The expansion of communication systems is the undeniable advantage of the most contemporary digital technologies. However, when a specialist user such as an inventor or an idea owner communicates through a communication system, their intellects are ...
Akram Kargar Raeespour+1 more
doaj +1 more source
ML-based tunnel detection and tunneled application classification [PDF]
Encrypted tunneling protocols are widely used. Beyond business and personal uses, malicious actors also deploy tunneling to hinder the detection of Command and Control and data exfiltration. A common approach to maintain visibility on tunneling is to rely on network traffic metadata and machine learning to analyze tunnel occurrence without actually ...
arxiv
The introduction of SDN in IP backbones requires the coexistence of regular IP forwarding and SDN based forwarding. The former is typically applied to best effort Internet traffic, the latter can be used for different types of advanced services (VPNs ...
Gerola, Matteo+5 more
core +1 more source
DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks [PDF]
DDoS attacks remain a major security threat to the continuous operation of Internet edge infrastructures, web services, and cloud platforms. While a large body of research focuses on DDoS detection and protection, to date we ultimately failed to eradicate DDoS altogether.
arxiv
A LoRaWAN Testbed Design for Supporting Critical Situations: Prototype and Evaluation
The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. A massive number of sensors and actuators are expected to emerge, requiring new wireless technologies that can extend their battery life and can cover large
Jorge Navarro-Ortiz+5 more
wiley +1 more source
Software‐Defined Edge Cloud Framework for Resilient Multitenant Applications
Edge application’s distributed nature presents significant challenges for developers in orchestrating and managing the multitenant applications. In this paper, we propose a practical edge cloud software framework for deploying multitenant distributed smart applications.
Kaikai Liu+6 more
wiley +1 more source