Results 51 to 60 of about 24,263 (216)

Multicast traffic aggregation in MPLS-based VPN networks [PDF]

open access: yes, 2007
This article gives an overview of the current practical approaches under study for a scalable implementation of multicast in layer 2 and 3 VPNs over an IP-MPLS multiservice network. These proposals are based on a well-known technique: the aggregation of
Larrabeiti López, David   +3 more
core   +2 more sources

Secure Deployment of Smart Meters

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout   +4 more
wiley   +1 more source

ДОСЛІДЖЕННЯ ЕФЕКТИВНОСТІ ФУНКЦІОНУВАННЯ ЗАХИЩЕНИХ КАНАЛІВ ЗВ’ЯЗКУ З ВИКОРИСТАННЯМ ТЕРМІНАЛІВ СУПУТНИКОВОГО ЗВ’ЯЗКУ СИСТЕМИ FLYAWAY ДЛЯ ЕЛЕКТРОННОЇ КОМУНІКАЦІЙНОЇ МЕРЕЖІ СПЕЦІАЛЬНОГО ПРИЗНАЧЕННЯ

open access: yesСистеми обробки інформації
В статті наведено результати дослідження ефективності функціонування захищених каналів зв’язку, утворених з використанням терміналів супутникового зв’язку FlyAway та Virtual Private Network (VPN) Layer 2 Tunneling Protocol (L2TP/IPSec), OpenVPN, Secure ...
Д.С. Комін   +3 more
doaj   +1 more source

Optimizing decision trees for multi-class VPN and non-VPN traffic classification using BBFS-PSO [PDF]

open access: yesPeerJ Computer Science
Accurate classification of Virtual Private Network (VPN) and non-VPN network traffic is critical for effective management and security in today’s encrypted and privacy-conscious network environments.
S. Kumar Reddy Mallidi   +1 more
doaj   +2 more sources

Membangun Jaringan Virtual Private Network (Vpn) Dengan Metode Tunneling Menggunakan Ubuntu 11.10 Pada Laboratorium Jaringan STMIK PPKIA Pradnya Paramita Malang [PDF]

open access: yes, 2016
Local computer network is a computer network that is built on the college STMIK PPKIA Pradnya Paramita Malang and serves as a support learning tool for students. This private network built and designed by an Admin.
Muhsyi, A. (Abdul)
core  

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]

open access: yes, 2012
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T.   +4 more
core   +1 more source

Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza   +4 more
wiley   +1 more source

Implementasi Vpn Untuk Akses Server Melalui Perangkat Mobile Pada Jaringan Komputer Smk Triatma Jaya Semarang [PDF]

open access: yes, 2015
The network manager of Triatma Jaya Vocational High School want to manage a LAN (Local Area Network)easy and practical. One requirement is to access and control the LAN network through the Internet and mobiledevices.
Bagyono, P. A. (Petrus)   +1 more
core  

Detection of APTs by Machine Learning: A Performance Comparison

open access: yesExpert Systems, Volume 43, Issue 1, January 2026.
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela   +5 more
wiley   +1 more source

ANALISIS PERFORMA AES128-SHA DAN DES-CBC-SHA PADA PROTOKOL OPENSSL [PDF]

open access: yes, 2017
Keamanan dalam berinternet menjadi masalah yang sangat diperhatikan dewasa ini. Hal ini terjadi karena marak terjadi kejahatan dunia maya atau cyber crime. Oleh karena itu diperlukan suatu mekanisme keamanan saat menggunakan internet.
IZAZA, RAMADHANA AZWA
core  

Home - About - Disclaimer - Privacy