Research on meteorological information network security system based on VPN Technology [PDF]
In this paper, the concept of VPN and the security technology are studied. In combination with the characteristics of the network, the security technology of the remote access VPN server and the client is discussed, the VPN security system of the ...
Chen Jianyun, Li Chunyan
doaj +2 more sources
VPN Traffic Hijacking Defense Technology Based on Mimic Defense [PDF]
VPN technology can effectively guarantee the confidentiality and integrity of communication traffic.However,the traffic hijacking attack named blind in/on-path emerged in recent years,uses VPN protocol rules to implement attacks by injecting forged ...
GAO Zhen, CHEN Fucai, WANG Yawen, HE Weizhen
doaj +1 more source
IoT-Cloud, VPN, and Digital Twin-Based Remote Monitoring and Control of a Multifunctional Robotic Cell in the Context of AI, Industry, and Education 4.0 and 5.0. [PDF]
Filipescu A +3 more
europepmc +2 more sources
Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima
Perancangan ini berlatar belakang oleh adanya kebutuhan suatu jaringan yang mengkhususkan user tertentu untuk mengakses data lokal dari suatu server.
Farizal Triyansa, Irwan Agus Sobari
doaj +1 more source
SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi +3 more
doaj +1 more source
Network Security Analysis Using Virtual Private Network in Vocational School
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN).
Yosi Nofita Sari, Dedy Irfan, Asrul Huda
doaj +1 more source
Analysis and Verification of IPSec VPN Security Vulnerability [PDF]
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj +1 more source
Dissecting Deradicalization: Challenges for Theory and Practice in Germany
Compared to the topic of radicalization, deradicalization was long treated as secondary in research, at least until recently. This article outlines the most important findings from theory and practice in three steps by: (1) discussing and reviewing ...
Till Baaken +3 more
doaj +1 more source
Penerapan Firewall Dan Protokol IpSec/L2TP Sebagai Solusi Keamanan Akses Jaringan Publik
Firewall is an algorithm that allows filtering activities to determine access restrictions on a komputer that can use Publik network access and which komputer s cannot pass through Publik network access, this is commonly called filtering. As time goes
Muhammad Ayub +2 more
doaj +1 more source
Design and Implementation of Controlling and Monitoring System Based on Wireless VPN [PDF]
The work presented in this paper was concerned to design a new remote control and monitoring system, which can be used for controlling the electrical devices at college/office and monitoring the clients' status by using the Virtual Private Network (VPN).
Siraj Qays Mahdi
doaj +1 more source

