Results 231 to 240 of about 107,397 (277)
Some of the next articles are maybe not open access.
A study of cloud-based VPN establishment using network function virtualization technique
2022 3rd International Conference on Smart Electronics and Communication (ICOSEC), 2022Network Function Virtualization is the process of moving networking functions like Firewall, Load Balancing, Virtual Private networks (VPN), Gateway Antivirus, etc. away from proprietary hardware to the virtual server.
Sankili Santhanamahalingam +2 more
semanticscholar +1 more source
VPN Traffic Identification Based on Tunneling Protocol Characteristics
2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET), 2022Virtual Private Network (VPN) provides a secure, encrypted, and anonymous communication between remote networks. More and more people are inclined to use, with the raising network security and privacy protection awareness.
Yu Li, Fei Wang, Shuhui Chen
semanticscholar +1 more source
VPN Traffic Analysis: A Survey on Detection and Application Identification
IEEE AccessNetwork traffic analysis is fundamental for cybersecurity, network management, and policy enforcement. The widespread adoption of encryption, particularly through Virtual Private Networks (VPNs), presents a significant challenge by obscuring traditional ...
Y. Razooqi, A. Pekár
semanticscholar +1 more source
Performance Evaluation of Multimedia over MPLS VPN and IPSec Networks
2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), 2022In this paper multimedia streaming applications is performance is evaluated over MPLS network using two VPN techniques MPLS VPN and IPSec using OPNET simulation tool.
A. M. Sllame
semanticscholar +1 more source
Inf.
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to
Syed Muhammad Zohaib +5 more
semanticscholar +1 more source
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to
Syed Muhammad Zohaib +5 more
semanticscholar +1 more source
Research on the application of cross-domain VPN technology based on MPLS BGP
2022 6th International Conference on Wireless Communications and Applications (ICWCAPP), 2022In order to support the exchange of VPN routing information between operators, it is necessary to extend the existing protocols and modify the MPLS VPN architecture to provide an interconnection model that is different from that provided by the basic ...
Wenhua Wu, Ting Yan, Wei Cao, Hang Li
semanticscholar +1 more source
ICCBN, 2022
The Philippines is an archipelago or string of over 7,640 islands in southeastern Asia. With the community's active support, the Philippine National Police (PNP) is entrusted with upholding the law, preventing and controlling crimes, maintaining peace ...
W. Rey, M. Baccay
semanticscholar +1 more source
The Philippines is an archipelago or string of over 7,640 islands in southeastern Asia. With the community's active support, the Philippine National Police (PNP) is entrusted with upholding the law, preventing and controlling crimes, maintaining peace ...
W. Rey, M. Baccay
semanticscholar +1 more source
Identifying VPN Servers through Graph-Represented Behaviors
The Web ConferenceIdentifying VPN servers is a crucial task in various situations, such as geo-fraud detection, bot traffic analysis and network attack identification. Although numerous studies that focus on network traffic detection have achieved excellent performance in
Chenxu Wang +5 more
semanticscholar +1 more source
A Comparative Research on SSL VPN and IPSec VPN
2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, 2012with the development of information technology, VPN technology has been widely applied in variety of fields. In this paper, two kinds of VPN : IPSec and SSL VPN are studied in detailed, and the scope of application, security, scalability and other aspects are analyzed and compared, advantages and inadequacy are summarized, finally, VPN selection ...
Huaqing Mao, Li Zhu, Hang Qin
openaire +1 more source
2020
An increasing number of enterprises are opting for VPN and the vendors come out with hardware which comes along with software , such as added support for hardware based - encryptors. Some have enhanced the server capabilities to accommodate VPN related functionalities such as security in firewall based VPN's. Most specialized VPN products are hardware (
openaire +1 more source
An increasing number of enterprises are opting for VPN and the vendors come out with hardware which comes along with software , such as added support for hardware based - encryptors. Some have enhanced the server capabilities to accommodate VPN related functionalities such as security in firewall based VPN's. Most specialized VPN products are hardware (
openaire +1 more source

