AAE-DSVDD: A one-class classification model for VPN traffic identification

S Lv, C Wang, Z Wang, S Wang, B Wang, Y Zhang - Computer Networks, 2023 - Elsevier
Abstract Virtual Private Network (VPN) can provide a concealed transmission channel for
communication and protect the privacy of users. However, it also brings hidden dangers to …

Comparative analysis of site-to-site layer 2 virtual private networks

ST Aung, T Thein - 2020 IEEE Conference on Computer …, 2020 - ieeexplore.ieee.org
Nowadays, many companies have branch offices and connect those offices to the main
office over the Internet using a site-to-site Virtual Private Network connection. Most of these …

[PDF][PDF] Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review.

AA Al-khatib, R Hassan - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Network real-time applications are gaining rapid prominence on today's Internet, particularly
video and audio streaming, conferencing and telephony applications. The original design of …

Mobile-based Network Monitoring System Using Zabbix and Telegram

A Mardiyono, W Sholihah… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Network monitoring system is a system that works to observe and monitor the situation on a
running computer network. Network monitoring is very important to keep the network running …

islEHR, a model for electronic health records interoperability

A Najjar, B Amro, M Macedo - Bio-Algorithms and Med-Systems, 2022 - degruyter.com
Objectives Due to the diversity, volume, and distribution of ingested data, the majority of
current healthcare entities operate independently, increasing the problem of data …

Secured Remote Access of Cloud-Based Learning Management System (LMS) Using VPN

P Chatterjee, R Bose, S Banerjee, S Roy - Pattern Recognition and Data …, 2022 - Springer
Globally, education system is in changing process. The new tendency is everywhere, from
traditional classroom systems to digitalization systems. Cloud-based learning management …

[HTML][HTML] Quality of Service and Security on Cisco Network Devices, Coupled with the Development of a Mobile Application Prototype Software for Server Room …

D Mudenda, CS Lubobya - Journal of Computer and Communications, 2024 - scirp.org
In an era where digital technology is paramount, higher education institutions like the
University of Zambia (UNZA) are employing advanced computer networks to enhance their …

[PDF][PDF] Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis.

D Kim, N Kim, J Ahn - Computers, Materials & Continua, 2024 - cdn.techscience.cn
This research aims to propose a practical framework designed for the automatic analysis of
a product's comprehensive functionality and security vulnerabilities, generating applicable …

Information and communication system technology with VPN site-to-site IPsec

W Sholihah, T Rizaldi, I Novianty - Journal of Physics …, 2019 - iopscience.iop.org
This research aims to solve network problems in Information and Communication
Technology (ICT) project at Gelora Bung Karno (GBK) gym building. The ICT project was …

[HTML][HTML] Secured Storage Mechanism for the Cloud-Based Banking Applications Using ECC

V Gopinath - Information Systems Management, 2022 - intechopen.com
The security of data becomes more vulnerable despite the various safety measures. The
significant contribution of the chapter is to describe the design of a secured Cloud storage …