Results 1 to 10 of about 107,397 (277)

Application of MPLS Tunnel Service L2TP-VPN Optimization Concept with Traffic Engineering Method for Looping-Protection Service Analysis [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
This research began when observations were made on any-to-any-connection services that require QoS (Quality of Service) and tunnel measurements. Tunnel is a technique to interconnect between local networks that are separated through a public network ...
Lukman Medriavin Silalahi   +6 more
doaj   +2 more sources

Research on meteorological information network security system based on VPN Technology [PDF]

open access: diamondMATEC Web of Conferences, 2018
In this paper, the concept of VPN and the security technology are studied. In combination with the characteristics of the network, the security technology of the remote access VPN server and the client is discussed, the VPN security system of the ...
Chen Jianyun, Li Chunyan
doaj   +2 more sources

VPN: Learning Video-Pose Embedding for Activities of Daily Living [PDF]

open access: greenEuropean Conference on Computer Vision, 2020
In this paper, we focus on the spatio-temporal aspect of recognizing Activities of Daily Living (ADL). ADL have two specific properties (i) subtle spatio-temporal patterns and (ii) similar visual patterns varying with time.
Srijan Das   +4 more
openalex   +2 more sources

Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan

open access: diamondJurnal KomtekInfo, 2021
One of the ways to maintain and improve the quality of service and security on the network of an agency of the Barangin Sub-District Office, Sawahlunto City (Central) is to add a VPN feature.
Prayogi Wicaksana   +2 more
openalex   +3 more sources

qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era

open access: yesIEEE Access
This paper introduces qTrustNet VPN, a next-generation Virtual Private Network (VPN) designed to enhance security in the quantum era. As traditional encryption methods face obsolescence due to the advent of quantum computing, there is an urgent need for ...
Hyoungsub Shim   +4 more
doaj   +2 more sources

Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)

open access: diamondInternet of Things and Artificial Intelligence Journal, 2023
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the ...
Aliyyah Rosyidah, Jumadi Mabe Parenreng
openalex   +3 more sources

Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework

open access: yesApplied Sciences
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments.
Saad Said Alqahtany, Toqeer Ali Syed
doaj   +2 more sources

VPN Traffic Hijacking Defense Technology Based on Mimic Defense [PDF]

open access: yesJisuanji kexue, 2023
VPN technology can effectively guarantee the confidentiality and integrity of communication traffic.However,the traffic hijacking attack named blind in/on-path emerged in recent years,uses VPN protocol rules to implement attacks by injecting forged ...
GAO Zhen, CHEN Fucai, WANG Yawen, HE Weizhen
doaj   +1 more source

Characterizing the VPN Ecosystem in the Wild [PDF]

open access: yesPassive and Active Network Measurement Conference, 2023
With the shift to working remotely after the COVID-19 pandemic, the use of Virtual Private Networks (VPNs) around the world has nearly doubled. Therefore, measuring the traffic and security aspects of the VPN ecosystem is more important now than ever. It
Aniss Maghsoudlou   +3 more
semanticscholar   +1 more source

VPN++: Rethinking Video-Pose Embeddings for Understanding Activities of Daily Living [PDF]

open access: yesIEEE Transactions on Pattern Analysis and Machine Intelligence, 2021
Many attempts have been made towards combining RGB and 3D poses for the recognition of Activities of Daily Living (ADL). ADL may look very similar and often necessitate to model fine-grained details to distinguish them. Because the recent 3D ConvNets are
Srijan Das   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy