Results 221 to 230 of about 107,397 (277)
Some of the next articles are maybe not open access.
Using Ensemble Learning for Securing Public Area Networks from VPN Malicious Transmissions
2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), 2023In this paper, a new paradigm for network security is developed via the use of ensemble learning. The primary objective of this study is to identify and stop the involvement of malicious communication into network configurations, especially in public ...
Aadil Khan, Ishu Sharma
semanticscholar +1 more source
Cross Protocol Attack on IPSec-based VPN
International Symposium on Digital Forensics and Security, 2023Network layer protocols that provide privacy, such as IPSec, are widely used in Virtual Private Network(VPN) services to provide security between two networks or hosts.
Amaldeep S, S. Sankaran
semanticscholar +1 more source
Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon
Proc. ACM Hum. Comput. Interact., 2023Users face security folklore in their daily lives in the form of security advice, myths, and word-of-mouth stories. Using a VPN to access the Tor network, i.e., Tor over VPN, is an interesting example of security folklore because of its inconclusive ...
Matthias Fassl +3 more
semanticscholar +1 more source
Journal of Advanced Computing Systems, 2023
End-to-end encryption is now the default for major Internet applications, reducing the effectiveness of payload-based deep packet inspection for security monitoring and traffic engineering. This paper evaluates payload-agnostic encrypted traffic analysis
Meng-Ju Kuo, Boning Zhang, Haozhe Wang
semanticscholar +1 more source
End-to-end encryption is now the default for major Internet applications, reducing the effectiveness of payload-based deep packet inspection for security monitoring and traffic engineering. This paper evaluates payload-agnostic encrypted traffic analysis
Meng-Ju Kuo, Boning Zhang, Haozhe Wang
semanticscholar +1 more source
An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN
Photonic Network Communications, 2004Recently, there has been rapid development and deployment of virtual private network (VPN) services. There are wide varieties of IP-based VPNs and optical VPNs (OVPNs) proposed in the literature and readers could easily get confused with so many different types of VPNs.
Zhang, Zhensheng +3 more
openaire +1 more source
SMART eLAB, 2017
Il problema dell'accesso ad una rete in modalità sicura è uno degli argomenti che i sistemisti si trovano ad affrontare con maggior frequenza. In una rete di Campus come quella dell'Areadella Ricerca RM 1 del Consiglio Nazionale delle Ricerche e di rilevante importanza che il personale, che spesso per motivi di lavoro, si trova in luoghi diversi dalla ...
Fabrizio Valenti (a) +4 more
openaire +3 more sources
Il problema dell'accesso ad una rete in modalità sicura è uno degli argomenti che i sistemisti si trovano ad affrontare con maggior frequenza. In una rete di Campus come quella dell'Areadella Ricerca RM 1 del Consiglio Nazionale delle Ricerche e di rilevante importanza che il personale, che spesso per motivi di lavoro, si trova in luoghi diversi dalla ...
Fabrizio Valenti (a) +4 more
openaire +3 more sources
Investigating Influencer VPN Ads on YouTube
IEEE Symposium on Security and Privacy, 2022One widespread, but frequently overlooked, source of security information is influencer marketing ads on YouTube for security and privacy products such as VPNs.
Omer Akgul +4 more
semanticscholar +1 more source
Design of IoT Based VPN Gateway for Home Network
2022 International Conference on Electronics and Renewable Systems (ICEARS), 2022With the rapid development of technology, individuals can keep with their handy devices like notebooks, tablet computers, and smart cell phones for doing their personal and professional works regardless of the place and location.
J. Raj, S. Srinivasulu
semanticscholar +1 more source
QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method
2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), 2022This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme.
Erryc Darmawan +2 more
semanticscholar +1 more source
Passwordless VPN using FIDO2 Security Keys: Modern authentication security for legacy VPN systems
International Conference on Data Intelligence and Security, 2022This paper describes a method of secure authentication using FIDO2 security keys with VPN systems based on legacy protocols by leveraging a dedicated web-based VPN portal and allowing to implement a Passwordless access method.
Emin Huseynov
semanticscholar +1 more source

