Method of building dynamic multi-hop VPN chains for ensuring security of terminal access systems

T Vitalii, B Anna, H Kateryna… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
International business groups are increasingly using terminal systems as workstations. At
the same time, virtual machine servers are often located in the head structure, while remote …

Research on network security of VPN technology

Z Xu, J Ni - … Conference on Information Science and Education …, 2020 - ieeexplore.ieee.org
with the wide adoption of Internet, it has become a tool that we can use to work and learn at
any time anywhere as we wish. Internet has made it possible to have video conferences …

The fault-tolerant structure of multilevel secure access to the resources of the public network

V Kolomoitcev, VA Bogatyrev - … 2016, Moscow, Russia, November 21-25 …, 2016 - Springer
The paper presents the evaluation of the effectiveness of the structural organization of the
system of multi-level secure access to external network resources. We conducted a …

[PDF][PDF] Principles of Constructing an Overlay Network Based on Cellular Communication Systems for Secure Control of Intelligent Mobile Objects/Vitalii Tkachov …

V Tkachov - … научно-практической конференции ИТБ-2020.–К …, 2020 - dwl.kiev.ua
The current state of the problem regarding secure control of intelligent mobile objects using
existing telecommunication infrastructures as a data transmission medium is described in …

Overlay Network Infrastructure for Remote Control of Radio Astronomy Observatory

V Tkachov, M Bondarenko, O Ulyanov… - … on Advanced Trends …, 2019 - ieeexplore.ieee.org
Joint scientific experiments are the main way of international cooperation in the field of
science. One of the ways to organize joint research is providing remote groups of scientists …

Traffic engineering and QoS in a Proposed MPLS-VPN

EM Gales, V Croitoru - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
This paper comes with a solution to the use of multiple simultaneous applications (data and
voice) in a secure trouble-free environment. More exactly, it presents a network based not …

Investigation of the applicability of SSL/TLS protocol for VPN in APCS

D Rybin, K Piliugina, P Piliugin - 2018 IEEE Conference of …, 2018 - ieeexplore.ieee.org
One of the most important goals of information security is to ensure the safety of critical
facilities such as power plants, traffic control systems, etc. The primary role of ACS is the …

Mathematical Model of Calculating the Maximum Number of Disjoint Paths in Secure Routing

O Lemeshko, O Yeremenko, A Persikov… - … on Information and …, 2018 - ieeexplore.ieee.org
In this paper, the mathematical model of calculating the maximum number of disjoint paths in
secure routing in the infocommunication network is presented. The task of calculating the …

Development of recommendations for the implementation of virtualization concepts in modern networks

K Danylo, Y Kravchenko, O Starkova… - … on Problems of …, 2020 - ieeexplore.ieee.org
The study examines the core and architecture of virtualization technology, the state of the
modern infrastructure of information and telecommunications networks, as well as the use of …

About of One Methods Synthesis the Structural Protected Computer Network

SK Ganiev, DY Irgasheva - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
About of One Methods Synthesis the Structural Protected Computer Network Page 1 About of
One Methods Synthesis the Structural Protected Computer Network Salim Karimovich Ganiev …