Results 11 to 20 of about 486,360 (195)
Most of the existing virtual scenarios built for the digital protection of Chinese classical private gardens are too modern in expression style to show the aesthetic significance of their historical period.
Shuai Hong +6 more
doaj +2 more sources
Network Security Analysis Using Virtual Private Network in Vocational School
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN).
Yosi Nofita Sari, Dedy Irfan, Asrul Huda
doaj +1 more source
Mikrotik VPN Shielding E-Link Health Reports: Strengthening Data Security at Madiun Health Office
Advances in Information and Communication Technology have led to revolutionary changes in computer networking, especially in Indonesia, which has witnessed significant technological growth over the last four years.
Bintang Agung Gumelar +2 more
doaj +1 more source
Virtual Private Networks [PDF]
Business has changed in the last couple of decades. Companies now have to think about having a global presence, global marketing, and logistics. Most of the organizations have branches spread across different geographies of the world. Wherever you are located, all these branches need to be connected with their headquarters data center for information ...
Crescenzio Gallo +2 more
+4 more sources
Comparative analysis of VPN protocols
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec.
Jerzy Antoniuk +1 more
doaj +1 more source
Implementasi Jaringan Internet Site To Site VPN Dengan Metode IPSec Pada PT Telkom Akses
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with a private data security network, the closure of data transfer from illegal access and network scalability are the main standards in a Virtual ...
Try Budi Septiandoko +2 more
doaj +1 more source
PETRI NETS MODELING FOR SDN TOPOLOGIES [PDF]
The article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming ...
AMEEN, Ali, GUȚULEAC, Emilian
doaj +1 more source
Design and Implementation of Controlling and Monitoring System Based on Wireless VPN [PDF]
The work presented in this paper was concerned to design a new remote control and monitoring system, which can be used for controlling the electrical devices at college/office and monitoring the clients' status by using the Virtual Private Network (VPN).
Siraj Qays Mahdi
doaj +1 more source
SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi +3 more
doaj +1 more source
Optimal Orchestration of Virtual Network Functions [PDF]
-The emergence of Network Functions Virtualization (NFV) is bringing a set of novel algorithmic challenges in the operation of communication networks. NFV introduces volatility in the management of network functions, which can be dynamically orchestrated,
Addis, Bernardetta +3 more
core +1 more source

