Security assessment and evaluation of VPNs: a comprehensive survey

H Abbas, N Emmanuel, MF Amjad, T Yaqoob… - ACM Computing …, 2023 - dl.acm.org
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …

A review of MongoDB and singularity container security in regards to hipaa regulations

A Mailewa Dissanayaka, RR Shetty, S Kothari… - … Proceedings of the10th …, 2017 - dl.acm.org
Nowadays Linux Containers which have operating system level virtualization, are very
popular over virtual machines (VMs) which have hypervisor or kernel level virtualization in …

Emotional and practical considerations towards the adoption and abandonment of vpns as a privacy-enhancing technology

M Namara, D Wilkinson, K Caine, BP Knijnenburg - 2020 - nru.uncst.go.ug
Virtual Private Networks (VPNs) can help people protect their privacy. Despite this, VPNs are
not widely used among the public. In this survey study about the adoption and usage of …

A VPN performances analysis of constrained hardware open source infrastructure deploy in IoT environment

AF Gentile, D Macrì, F De Rango, M Tropea, E Greco - Future Internet, 2022 - mdpi.com
Virtual private network (VPN) represents an HW/SW infrastructure that implements private
and confidential communication channels that usually travel through the Internet. VPN is …

[图书][B] Mobile cloud computing: foundations and service models

D Huang, H Wu - 2017 - books.google.com
Mobile Cloud Computing: Foundations and Service Models combines cloud computing,
mobile computing and wireless networking to bring new computational resources for mobile …

QoS-Classifier for VPN and Non-VPN traffic based on time-related features

JA Caicedo-Munoz, AL Espino, JC Corrales… - Computer Networks, 2018 - Elsevier
Abstract The Quality of Service (QoS) is a continuous challenge issue in the
telecommunication industry, mainly for having an impact on telco services provision. Traffic …

Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)

MA Gunawan, S Wardhana - RESISTOR (Elektronika Kendali …, 2023 - jurnal.umj.ac.id
VPN merupakan teknologi yang dapat membuat jaringan privat dengan memanfaatkan
jaringan publik untuk mengamankan proses pertukaran data. Teknologi VPN biasanya …

A secure middlebox framework for enabling visibility over multiple encryption protocols

J Han, S Kim, D Cho, B Choi, J Ha… - IEEE/ACM Transactions …, 2020 - ieeexplore.ieee.org
Network middleboxes provide the first line of defense for enterprise networks. Many of them
typically inspect packet payload to filter malicious attack patterns. However, the widespread …

[图书][B] Software-Defined networking and security: from theory to practice

D Huang, A Chowdhary, S Pisharody - 2018 - taylorfrancis.com
This book provides readers insights into cyber maneuvering or adaptive and intelligent
cyber defense. It describes the required models and security supporting functions that …

Toward Zero-Trust 6GC: A Software Defined Perimeter Approach with Dynamic Moving Target Defense Mechanism

Z Abdelhay, Y Bello, A Refaey - IEEE Wireless …, 2024 - ieeexplore.ieee.org
The upcoming Sixth Generation (6G) network is projected to grapple with a range of security
concerns, encompassing access control, authentication, secure connections among 6G …