Results 1 to 10 of about 86,586 (204)

Flexible and Concurrent All-Optical VPN in OFDMA PON

open access: yesIEEE Photonics Journal, 2013
We propose and experimentally demonstrate a new scheme to support an all-optical virtual private network (VPN) in orthogonal frequency-division multiple-access passive optical networks (OFDMA PONs). In our scheme, VPN communications among optical network
Xinhong Jiang, Yikai Su
exaly   +3 more sources

Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework

open access: yesApplied Sciences (Switzerland)
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments.
Saad Said Alqahtany, Toqeer Ali Syed
exaly   +3 more sources

VPN Traffic Hijacking Defense Technology Based on Mimic Defense [PDF]

open access: yesJisuanji kexue, 2023
VPN technology can effectively guarantee the confidentiality and integrity of communication traffic.However,the traffic hijacking attack named blind in/on-path emerged in recent years,uses VPN protocol rules to implement attacks by injecting forged ...
GAO Zhen, CHEN Fucai, WANG Yawen, HE Weizhen
doaj   +1 more source

Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima

open access: yesComputer Science, 2022
Perancangan ini berlatar belakang oleh adanya kebutuhan suatu jaringan yang mengkhususkan user tertentu untuk mengakses data lokal dari suatu server.
Farizal Triyansa, Irwan Agus Sobari
doaj   +1 more source

SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network

open access: yesJournal of Computing Research and Innovation, 2021
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Network Security Analysis Using Virtual Private Network in Vocational School

open access: yesJurnal Paedagogy, 2022
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN).
Yosi Nofita Sari, Dedy Irfan, Asrul Huda
doaj   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Dissecting Deradicalization: Challenges for Theory and Practice in Germany

open access: yesInternational Journal of Conflict and Violence, 2020
Compared to the topic of radicalization, deradicalization was long treated as secondary in research, at least until recently. This article outlines the most important findings from theory and practice in three steps by: (1) discussing and reviewing ...
Till Baaken   +3 more
doaj   +1 more source

Penerapan Firewall Dan Protokol IpSec/L2TP Sebagai Solusi Keamanan Akses Jaringan Publik

open access: yesComputer Science, 2021
Firewall is an algorithm that allows filtering activities to determine access restrictions on a komputer  that can use Publik  network access and which komputer s cannot pass through Publik  network access, this is commonly called filtering. As time goes
Muhammad Ayub   +2 more
doaj   +1 more source

Design and Implementation of Controlling and Monitoring System Based on Wireless VPN [PDF]

open access: yesEngineering and Technology Journal, 2013
The work presented in this paper was concerned to design a new remote control and monitoring system, which can be used for controlling the electrical devices at college/office and monitoring the clients' status by using the Virtual Private Network (VPN).
Siraj Qays Mahdi
doaj   +1 more source

Home - About - Disclaimer - Privacy