Results 21 to 30 of about 107,397 (277)
Epidemiological conditions in autumn 2020 required that the most of courses and training in High school have to be executed in distant mode, online.
Dmitry Gouriev
doaj +1 more source
Vinpocetine is the forthcoming adjuvant agent in the management of COVID-19
Vinpocetine (VPN) is an alkaloid derivative of vincamine inhibits phosphodiesterase type 1 that increase cyclic guanosine monophosphate and cyclic adenosine monophosphate. VPN have anti-inflammatory and antioxidant effects with suppression release of pro-
Hayder M Al-kuraishy +3 more
doaj +1 more source
VPNalyzer: Systematic Investigation of the VPN Ecosystem
—Use of Virtual Private Networks (VPNs) has been growing rapidly due to increased public awareness of online risks to privacy and security. This growth has fueled the VPN ecosystem to expand into a multi-billion dollar industry that sees a frequent influx
Reethika Ramesh +3 more
semanticscholar +1 more source
Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms
Virtual Private Networks (VPNs) are one example of encrypted communication services commonly used to bypass censorship and access geographically locked services.
Ammar Almomani
doaj +1 more source
Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)
VPN merupakan teknologi yang dapat membuat jaringan privat dengan memanfaatkan jaringan publik untuk mengamankan proses pertukaran data. Teknologi VPN biasanya digunakan untuk menghubungkan unit dan kantor cabang, yaitu dengan membangun terowongan antara
Muhammad Alvin Gunawan, Sukma Wardhana
semanticscholar +1 more source
Bedside differentiation of vestibular neuritis from central "vestibular pseudoneuritis". [PDF]
Acute unilateral peripheral and central vestibular lesions can cause similar signs and symptoms, but they require different diagnostics and management.
Brandt, Thomas +4 more
core +1 more source
MVDroid: an android malicious VPN detector using neural networks
The majority of Virtual Private Networks (VPNs) fail when it comes to protecting our privacy. If we are using a VPN to protect our online privacy, many of the well-known VPNs are not secure to use.
Saeed Seraj +3 more
semanticscholar +1 more source
U radu su prikazane osnovne karakteristike virtuelnih privatnih mreža (VPN - Virtual Private Networks). Analizirane su VPN mreže na drugom i trećem sloju sistema otvorenog za povezivanje (OSI - Open System Interconnection).
Marinko Smiljanić, Boban Z. Pavlović
doaj +1 more source
SECURING DATA NETWORK FOR GROWING BUSINESS VPN ARCHITECTURES CELLULAR NETWORK CONNECTIVITY [PDF]
Private networks allow organizations to leverage, customize and dedicate LTE network capabilities to their own service needs. These networks are controlled and managed locally and can be optimized for specific network services and applications.
Hillman Akhyar Damanik
doaj +1 more source
Characterization of Encrypted and VPN Traffic using Time-related Features
Traffic characterization is one of the major challenges in today’s security industry. The continuous evolution and generation of new applications and services, together with the expansion of encrypted communications makes it a difficult task.
G. Draper-Gil +3 more
semanticscholar +1 more source

