PROJECT FOR USING CISCO DMVPN: enabling the chance to use a proper vpn module [PDF]
Organizations operating across multiple locations require secure, efficient, and scalable communication over public networks. With the increasing adoption of remote work and cloud-based services, reliance on VPNs has grown substantially.
Juodikis, Tautvydas
core
Network Traffic Analysis Using Weak Indicators [PDF]
Tato práce popisuje metody pro klasifikaci síťového provozu, detekci hrozeb a bezpečnostního monitorování počítačových sítí. Poté je představena nová knihovna s názvem Weak Indication Framework, která si klade za cíl usnadňovat vývoj nových detektorů ...
Richard Plný
core
A flow-level dataset of WireGuard tunnel traffic with matched encrypted-side features and application labels. [PDF]
Razooqi YS, Pekar A.
europepmc +1 more source
ROS-Based Navigation and Obstacle Avoidance: A Study of Architectures, Methods, and Trends. [PDF]
Wei Z, Wang S, Chen K, Wang F.
europepmc +1 more source
Personal cloud-based NAS development [PDF]
El Network-Attached Storage (NAS) s'ha convertit en una solució essencial per als usuaris que requereixen un emmagatzematge de dades fiable, configurable i eficient.
González Abadia, Alberto +1 more
core
Innovative Hybrid Cloud Solutions for Physical Medicine and Telerehabilitation Research. [PDF]
Malakhov KS.
europepmc +1 more source
Wireless Sensing-based Daily Activity Tracking System Deployment in Low-Income Senior Housing Environments. [PDF]
Touhiduzzaman M +3 more
europepmc +1 more source
A Comparison of OpenVPN and WireGuard on Android
This paper investigates methods to secure communication between employee devices and the company network, namely virtual private networks (VPN), specifically for mobile devices using the Android operating system. Two widely used open-source protocols are compared for use in remote work, OpenVPN and Wire-Guard, to determine which has the more secure and
openaire +1 more source
Computationally Bounded Robust Compilation and Universally Composable Security
Universal Composability (UC) is the gold standard for cryptographic security, but mechanizing proofs of UC is notoriously difficult. A recently-discovered connection between UC and Robust Compilation (RC)$\unicode{x2014}$a novel theory of secure ...
Cecchetti, Ethan +2 more
core
An Adaptive Application-Aware Dynamic Load Balancing Framework for Open-Source SD-WAN. [PDF]
Petrović T +4 more
europepmc +1 more source

