Multicast traffic aggregation in MPLS-based VPN networks [PDF]
This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the aggregation of
Larrabeiti López, David +3 more
core +2 more sources
Secure Deployment of Smart Meters
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout +4 more
wiley +1 more source
В статті наведено результати дослідження ефективності функціонування захищених каналів зв’язку, утворених з використанням терміналів супутникового зв’язку FlyAway та Virtual Private Network (VPN) Layer 2 Tunneling Protocol (L2TP/IPSec), OpenVPN, Secure ...
Д.С. Комін +3 more
doaj +1 more source
Optimizing decision trees for multi-class VPN and non-VPN traffic classification using BBFS-PSO [PDF]
Accurate classification of Virtual Private Network (VPN) and non-VPN network traffic is critical for effective management and security in today’s encrypted and privacy-conscious network environments.
S. Kumar Reddy Mallidi +1 more
doaj +2 more sources
Membangun Jaringan Virtual Private Network (Vpn) Dengan Metode Tunneling Menggunakan Ubuntu 11.10 Pada Laboratorium Jaringan STMIK PPKIA Pradnya Paramita Malang [PDF]
Local computer network is a computer network that is built on the college STMIK PPKIA Pradnya Paramita Malang and serves as a support learning tool for students. This private network built and designed by an Admin.
Muhsyi, A. (Abdul)
core
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T. +4 more
core +1 more source
Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza +4 more
wiley +1 more source
Implementasi Vpn Untuk Akses Server Melalui Perangkat Mobile Pada Jaringan Komputer Smk Triatma Jaya Semarang [PDF]
The network manager of Triatma Jaya Vocational High School want to manage a LAN (Local Area Network)easy and practical. One requirement is to access and control the LAN network through the Internet and mobiledevices.
Bagyono, P. A. (Petrus) +1 more
core
Detection of APTs by Machine Learning: A Performance Comparison
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela +5 more
wiley +1 more source
ANALISIS PERFORMA AES128-SHA DAN DES-CBC-SHA PADA PROTOKOL OPENSSL [PDF]
Keamanan dalam berinternet menjadi masalah yang sangat diperhatikan dewasa ini. Hal ini terjadi karena marak terjadi kejahatan dunia maya atau cyber crime. Oleh karena itu diperlukan suatu mekanisme keamanan saat menggunakan internet.
IZAZA, RAMADHANA AZWA
core

