Results 41 to 50 of about 24,263 (216)

Implementation Dual link IPVPN and GSM IPsec based on Fortigate 50 E at PT XYZ

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Pada era teknologi yang serba online saat ini, salah satu upaya untuk menjaga kualitas jaringan yang diberikan kepada pelanggan dibutuhkan suatu sistem atau network yang membantu untuk mengatasi gangguan yang berkepanjangan di pelanggan.
Winarti Agustina Wina, Muhammad Rifqi
doaj   +1 more source

The dangers, directness, and purposes of online collective actions

open access: yesPolitical Psychology, EarlyView.
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery   +2 more
wiley   +1 more source

A solution to Enhance VPN effect on wireless network Performance

open access: yesمجلة النهرين للعلوم الهندسية, 2017
This work presents a design of secured Wireless Network by utilizing Virtual Private Network (VPN) technique and provides a solution to enhance its performance by using Wireless Quality of Service technique (WQoS).A set of parameter are investigated ...
Subhi Aswad, Muhanad Qasim
doaj  

SoftEther VPN on OpenWRT in a virtual environment using VirtualBox

open access: yesТехнічна інженерія
This article provides a comprehensive guide on installing and configuring a SoftEther VPN server on an OpenWRT platform, deployed within an Oracle VirtualBox virtual machine.
I.H. Falkovskyi   +2 more
doaj   +1 more source

Does Digitalisation Promote the Servicification of Manufacturing? Firm‐Level Evidence From China

open access: yesThe World Economy, Volume 49, Issue 4, Page 821-835, April 2026.
ABSTRACT In this paper, we explore the digital transformation of Chinese firms and their impact on service integration within manufacturing activities in China. Using highly disaggregated firm‐product level data, we examine various dimensions of the servicification in manufacturing and assess how digital adoption affects these processes.
Shandre Thangavelu   +3 more
wiley   +1 more source

Virtual private network (VPN) model for AIS real time monitoring

open access: yesIOP Conference Series: Earth and Environmental Science, 2022
Abstract The need for a ship monitoring system based on Automatic Identification System (AIS) has been developed and provides many broad benefits for the maritime world in Indonesia. The system can become an early warning system (EWS) for ship operators, port operators, and even ship owners for tracking a movement of their ships.
A Maulidi, M Abdullah, DW Handani
openaire   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Application of VPN in e-Business

open access: yesJournal of Measurement Science and Instrumentation, 2012
With the development of Internet,e-Business has gradually become a new model for business activity,however,the security of e-Business is a major bottleneck restricting the development of e-Business.Network with virtual private network(VPN)can reduce ...
LIU Shuang-ying, LI Bo
doaj  

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

Rancang Bangun Keamanan Data Jaringan Komputer dengan Menggunakan Metode Ipsec Vpn (Studi Kasus: Pt.agrabudi Komunika) [PDF]

open access: yes, 2017
Virtual Private Network (VPN), merupakan sebuah jaringan yang dibuat untuk melakukan transaksi data yang telah dienkripsi antara dua atau lebih pengguna jaringan yang resmi : Jaringan VPN seluruhnya menggunakan internet sehingga factor keamanan menjadi ...
Burhanuddin, A. (Amieq)   +1 more
core  

Home - About - Disclaimer - Privacy