Results 221 to 230 of about 107,397 (277)
Some of the next articles are maybe not open access.

Using Ensemble Learning for Securing Public Area Networks from VPN Malicious Transmissions

2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), 2023
In this paper, a new paradigm for network security is developed via the use of ensemble learning. The primary objective of this study is to identify and stop the involvement of malicious communication into network configurations, especially in public ...
Aadil Khan, Ishu Sharma
semanticscholar   +1 more source

Cross Protocol Attack on IPSec-based VPN

International Symposium on Digital Forensics and Security, 2023
Network layer protocols that provide privacy, such as IPSec, are widely used in Virtual Private Network(VPN) services to provide security between two networks or hosts.
Amaldeep S, S. Sankaran
semanticscholar   +1 more source

Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon

Proc. ACM Hum. Comput. Interact., 2023
Users face security folklore in their daily lives in the form of security advice, myths, and word-of-mouth stories. Using a VPN to access the Tor network, i.e., Tor over VPN, is an interesting example of security folklore because of its inconclusive ...
Matthias Fassl   +3 more
semanticscholar   +1 more source

Tokenized Flow-Statistics Encrypted Traffic Analysis: Comparative Evaluation of 1D-CNN, BiLSTM, and Transformer on ISCX VPN-nonVPN 2016 (A1+A2, 60 s)

Journal of Advanced Computing Systems, 2023
End-to-end encryption is now the default for major Internet applications, reducing the effectiveness of payload-based deep packet inspection for security monitoring and traffic engineering. This paper evaluates payload-agnostic encrypted traffic analysis
Meng-Ju Kuo, Boning Zhang, Haozhe Wang
semanticscholar   +1 more source

An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN

Photonic Network Communications, 2004
Recently, there has been rapid development and deployment of virtual private network (VPN) services. There are wide varieties of IP-based VPNs and optical VPNs (OVPNs) proposed in the literature and readers could easily get confused with so many different types of VPNs.
Zhang, Zhensheng   +3 more
openaire   +1 more source

VPN Management

SMART eLAB, 2017
Il problema dell'accesso ad una rete in modalità sicura è uno degli argomenti che i sistemisti si trovano ad affrontare con maggior frequenza. In una rete di Campus come quella dell'Areadella Ricerca RM 1 del Consiglio Nazionale delle Ricerche e di rilevante importanza che il personale, che spesso per motivi di lavoro, si trova in luoghi diversi dalla ...
Fabrizio Valenti (a)   +4 more
openaire   +3 more sources

Investigating Influencer VPN Ads on YouTube

IEEE Symposium on Security and Privacy, 2022
One widespread, but frequently overlooked, source of security information is influencer marketing ads on YouTube for security and privacy products such as VPNs.
Omer Akgul   +4 more
semanticscholar   +1 more source

Design of IoT Based VPN Gateway for Home Network

2022 International Conference on Electronics and Renewable Systems (ICEARS), 2022
With the rapid development of technology, individuals can keep with their handy devices like notebooks, tablet computers, and smart cell phones for doing their personal and professional works regardless of the place and location.
J. Raj, S. Srinivasulu
semanticscholar   +1 more source

QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method

2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), 2022
This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme.
Erryc Darmawan   +2 more
semanticscholar   +1 more source

Passwordless VPN using FIDO2 Security Keys: Modern authentication security for legacy VPN systems

International Conference on Data Intelligence and Security, 2022
This paper describes a method of secure authentication using FIDO2 security keys with VPN systems based on legacy protocols by leveraging a dedicated web-based VPN portal and allowing to implement a Passwordless access method.
Emin Huseynov
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy