Results 1 to 10 of about 10,664 (209)

Research on meteorological information network security system based on VPN Technology [PDF]

open access: diamondMATEC Web of Conferences, 2018
In this paper, the concept of VPN and the security technology are studied. In combination with the characteristics of the network, the security technology of the remote access VPN server and the client is discussed, the VPN security system of the ...
Chen Jianyun, Li Chunyan
doaj   +2 more sources

VPN Traffic Hijacking Defense Technology Based on Mimic Defense [PDF]

open access: yesJisuanji kexue, 2023
VPN technology can effectively guarantee the confidentiality and integrity of communication traffic.However,the traffic hijacking attack named blind in/on-path emerged in recent years,uses VPN protocol rules to implement attacks by injecting forged ...
GAO Zhen, CHEN Fucai, WANG Yawen, HE Weizhen
doaj   +1 more source

Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima

open access: yesComputer Science, 2022
Perancangan ini berlatar belakang oleh adanya kebutuhan suatu jaringan yang mengkhususkan user tertentu untuk mengakses data lokal dari suatu server.
Farizal Triyansa, Irwan Agus Sobari
doaj   +1 more source

SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network

open access: yesJournal of Computing Research and Innovation, 2021
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Network Security Analysis Using Virtual Private Network in Vocational School

open access: yesJurnal Paedagogy, 2022
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN).
Yosi Nofita Sari, Dedy Irfan, Asrul Huda
doaj   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Dissecting Deradicalization: Challenges for Theory and Practice in Germany

open access: yesInternational Journal of Conflict and Violence, 2020
Compared to the topic of radicalization, deradicalization was long treated as secondary in research, at least until recently. This article outlines the most important findings from theory and practice in three steps by: (1) discussing and reviewing ...
Till Baaken   +3 more
doaj   +1 more source

Penerapan Firewall Dan Protokol IpSec/L2TP Sebagai Solusi Keamanan Akses Jaringan Publik

open access: yesComputer Science, 2021
Firewall is an algorithm that allows filtering activities to determine access restrictions on a komputer  that can use Publik  network access and which komputer s cannot pass through Publik  network access, this is commonly called filtering. As time goes
Muhammad Ayub   +2 more
doaj   +1 more source

Design and Implementation of Controlling and Monitoring System Based on Wireless VPN [PDF]

open access: yesEngineering and Technology Journal, 2013
The work presented in this paper was concerned to design a new remote control and monitoring system, which can be used for controlling the electrical devices at college/office and monitoring the clients' status by using the Virtual Private Network (VPN).
Siraj Qays Mahdi
doaj   +1 more source

Home - About - Disclaimer - Privacy