Results 81 to 90 of about 86,586 (204)
A solution to Enhance VPN effect on wireless network Performance
This work presents a design of secured Wireless Network by utilizing Virtual Private Network (VPN) technique and provides a solution to enhance its performance by using Wireless Quality of Service technique (WQoS).A set of parameter are investigated ...
Subhi Aswad, Muhanad Qasim
doaj
Automated Negotiation for Provisioning Virtual Private Networks Using FIPA-Compliant Agents
This paper describes the design and implementation of negotiating agents for the task of provisioning virtual private networks. The agents and their interactions comply with the FIPA specification and they are implemented using the FIPA-OS agent ...
Buckle, P. +3 more
core +2 more sources
From Tweets to Tyranny: Exploring the Symmetry Between State and Social Media Censorship of Speech
Journal of Social Philosophy, EarlyView.
Bhanuraj Kashyap, Paul Formosa
wiley +1 more source
Perkembangan teknologi dalam infrastruktur server terus maju signifikan setiap tahun. Organisasi dan perusahaan cenderung beralih ke sistem yang lebih kompleks dan terpusat, mendorong migrasi infrastruktur server dari on-premise ke public cloud.
Rusdi Hermawan, Yuris Mulya Saputra
doaj +1 more source
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
This paper introduces qTrustNet VPN, a next-generation Virtual Private Network (VPN) designed to enhance security in the quantum era. As traditional encryption methods face obsolescence due to the advent of quantum computing, there is an urgent need for ...
Hyoungsub Shim +4 more
doaj +1 more source
Model of CanReg5 Implementation for Indonesia
Sistem registrasi kanker telah dibangun untuk mengelola data kanker di Rumah Sakit Kanker Dharmais dan beberapa rumah sakit di daerah. Namun, sistem yang ada dinilai tidak cukup untuk mendukung proses pengelolaan data di seluruh wilayah di Indonesia ...
JONATHAN ADITYA MULYONO +2 more
doaj +1 more source
Research on VPN service for government and enterprise customers in SDN-based vCPE networks
SDN technology has been studied widely recently. The main idea of SDN-based vCPE is using custom hardware and software to replace CPE. All vCPEs are managed by the SDN controller in a centralized way and the open programmable north interface can be ...
Fengchao FU, Peng WANG, Yuanbao XIE
doaj +2 more sources
SDN based Network Function Parallelism in Cloud
Network function virtualization (NFV) based service function chaining (SFC) allows the provisioning of various security and traffic engineering applications in a cloud network.
Chowdhary, Ankur, Huang, Dijiang
core
ЗАГРОЗИ ВІД ВИКОРИСТАННЯ CLOUD-СЕРВІСІВ У СФЕРІ КІБЕРБЕЗПЕКИ
У матеріалах статті описуються переваги та недоліки використання cloud-сервісів, можливість застосування як слабких, так і сильних сторін хмарних середовищ кіберзловмисниками з метою отримання доступу до конфіденційної інформації, що зберігається у хмарі.
Анастасія Вавіленкова
doaj +1 more source
Cybersecurity of remote work migration: A study on the VPN security landscape post Covid-19 outbreak
The Covid-19 pandemic led to an unprecedented reliance on Virtual Private Networks (VPNs) for remote work, exposing critical vulnerabilities in global cybersecurity infrastructures.
Kushtrim Qollakaj +2 more
doaj +1 more source

