Works matching DE "VIRTUAL private networks"
Results: 373
SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network.
- Published in:
- Journal of Computing Research & Innovation, 2021, v. 6, n. 4, p. 90, doi. 10.24191/jcrinn.v6i4.230
- By:
- Publication type:
- Article
From Uncertainty to Nonlinearity: Solving Virtual Private Network via Single-Sink Buy-at-Bulk.
- Published in:
- Mathematics of Operations Research, 2011, v. 36, n. 2, p. 185, doi. 10.1287/moor.1110.0490
- By:
- Publication type:
- Article
Applications Classification of VPN Encryption Tunnel Based on SAE-2dCNN Model.
- Published in:
- Journal of Artificial Intelligence (2579-0021), 2022, v. 4, n. 3, p. 133, doi. 10.32604/jai.2022.031800
- By:
- Publication type:
- Article
Design and implementation of the data acquisition system of a large scale network based on four-in-one meters.
- Published in:
- Indian Journal of Power & River Valley Development, 2020, v. 70, n. 9/10, p. 162
- By:
- Publication type:
- Article
Research on Vehicle-Ground Communication Technology Based on Public Network for Train Control System of Heavy Haul Railways.
- Published in:
- Railway Signalling & Communication Engineering, 2024, v. 21, n. 3, p. 29, doi. 10.3969/j.issn.1673-4440.2024.03.006
- By:
- Publication type:
- Article
基于SSL VPN协议的客户端安全接入应用.
- Published in:
- Railway Signalling & Communication Engineering, 2022, v. 19, n. 2, p. 35, doi. 10.3969/j.issn.1673-4440.2022.02.008
- By:
- Publication type:
- Article
Is Your Utility Leaking More Than Just Water?
- Published in:
- Journal: American Water Works Association, 2021, v. 113, n. 6, p. 85, doi. 10.1002/awwa.1752
- By:
- Publication type:
- Article
Establishing a Resilient and Protected Virtual Private Network (VPN) Infrastructure to Safeguard Network Communications and Ensure Secure Connectivity.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4264
- By:
- Publication type:
- Article
Developing a Novel Hierarchical VPLS Architecture Using Q-in-Q Tunneling in Router and Switch Design.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 9, p. 180, doi. 10.3390/computers12090180
- By:
- Publication type:
- Article
Copyright issues related to reproduction rights arising from streaming.
- Published in:
- Journal of World Intellectual Property, 2020, v. 23, n. 5/6, p. 798, doi. 10.1111/jwip.12175
- By:
- Publication type:
- Article
Development of Simulated Remote Monitoring and Operation System under Unstable Electric Power Supply.
- Published in:
- Journal of ICT Research & Applications, 2020, v. 14, n. 1, p. 78, doi. 10.5614/itbj.ict.res.appl.2020.14.1.6
- By:
- Publication type:
- Article
Protect your practice: cyber security tips.
- Published in:
- Veterinary Ireland Journal, 2022, v. 12, n. 10, p. 572
- By:
- Publication type:
- Article
Virtual machine scheduling and migration management across multi-cloud data centers: blockchain-based versus centralized frameworks.
- Published in:
- Journal of Cloud Computing (2192-113X), 2025, v. 14, n. 1, p. 1, doi. 10.1186/s13677-024-00724-7
- By:
- Publication type:
- Article
AN OPNET BASED NOVEL CROSS-LAYER MODEL FOR ANALYZING SOA-BASED INFORMATION SERVICES.
- Published in:
- Singidunum Journal of Applied Sciences, 2012, v. 9, n. 1, p. 51, doi. 10.5937/sjas1201051k
- By:
- Publication type:
- Article
Moving Libraries to the Cloud.
- Published in:
- International Journal of Information Dissemination & Technology, 2014, v. 4, n. 1, p. 28
- By:
- Publication type:
- Article
Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method.
- Published in:
- ISRN Communications & Networking, 2012, p. 1, doi. 10.5402/2012/914953
- By:
- Publication type:
- Article
Designing the VPN with Top-Down to Improve Information Security.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 182, doi. 10.14569/ijacsa.2024.0150620
- By:
- Publication type:
- Article
Detection Technique to trace IP behind VPN/Proxy using Machine Learning.
- Published in:
- International Journal of Next-Generation Computing, 2023, v. 14, n. 1, p. 216
- By:
- Publication type:
- Article
A Cold War Palimpsest and Warning to the West: Gordon Corera:Russians Among Us: Sleeper Cells, Ghost Stories, and the Hunt for Putin's Spies William Morrow, New York, 2020, 438 p., $32.50.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 4, p. 1356, doi. 10.1080/08850607.2022.2035202
- By:
- Publication type:
- Article
Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 283, doi. 10.3390/fi16080283
- By:
- Publication type:
- Article
A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment.
- Published in:
- Future Internet, 2022, v. 14, n. 9, p. 264, doi. 10.3390/fi14090264
- By:
- Publication type:
- Article
NORWAY to NEWFOUNDLAND: TESTING REMOTE OPERATIONS Across the Atlantic.
- Published in:
- Journal of Ocean Technology, 2024, v. 19, n. 1, p. 19
- By:
- Publication type:
- Article
Autonomy, Artificial Intelligence, and Telepresence: Advancing Ocean Science at Sea in the COVID-19 Era.
- Published in:
- Journal of Ocean Technology, 2020, v. 15, n. 4, p. 25
- By:
- Publication type:
- Article
Information Governance for the Implementation of Cloud Computing: A Review.
- Published in:
- IUP Journal of Information Technology, 2019, v. 15, n. 3, p. 22
- By:
- Publication type:
- Article
Charging wireless sensor network security technology based on encryption algorithms and dynamic model.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 3, p. 1, doi. 10.1177/1550147720901999
- By:
- Publication type:
- Article
An Experiment to Analyze Performance of Virtual Private Network Approach to Information Exchange between Health Facilities.
- Published in:
- Applied Medical Informatics, 2017, v. 39, n. 1/2, p. 21
- By:
- Publication type:
- Article
TRAINING SITUATION CENTER BASED ON THREE-DIMENSIONAL VIRTUAL STUDIO FOR DISTRIBUTED MOBILE ROBOTICS LABORATORY.
- Published in:
- Annals of DAAAM & Proceedings, 2015, v. 26, n. 1, p. 0483, doi. 10.2507/26th.daaam.proceedings.064
- By:
- Publication type:
- Article
ENTERPRISE NETWORK MONITORING USING OPEN SOURCE SOFTWARE.
- Published in:
- Annals of DAAAM & Proceedings, 2009, p. 223
- By:
- Publication type:
- Article
Trumpocalypse.
- Published in:
- CounterPunch, 2025, p. 1
- By:
- Publication type:
- Article
Fencing the Ocean: Australia's Social Media Safety Bill.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
Childish Fantasies: Age Verification for Social Media Down Under.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
Warring Against Encryption: Australia is Coming for Your Communications.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
Censorship Wars: Elon Musk, Safety Commissioners and Violent Content.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
The Racketeering of State Violence.
- Published in:
- CounterPunch, 2023, p. 265
- By:
- Publication type:
- Article
The US Government's War on TikTok is Idiotic, But There are Upsides.
- Published in:
- CounterPunch, 2023, p. 1
- By:
- Publication type:
- Article
The Internet Needs a Country of Its Very Own.
- Published in:
- CounterPunch, 2023, p. 1
- By:
- Publication type:
- Article
Working from Home: A Hacker's Perspective.
- Published in:
- Journal of Equipment Lease Financing, 2021, v. 39, n. 2, p. 1
- By:
- Publication type:
- Article
IRANIAN DEVOLUTION: Tehran Fights the Digital Future.
- Published in:
- World Affairs, 2015, v. 178, n. 3, p. 51
- By:
- Publication type:
- Article
Simplifying Licensed Resource Access Through Shibboleth.
- Published in:
- 2009
- By:
- Publication type:
- Proceeding
Casual virtual private network.
- Published in:
- Computer Systems Science & Engineering, 2005, v. 20, n. 3, p. 185
- By:
- Publication type:
- Article
Impact Damage Detection in Fiberglass Composites Using Low Acoustic Impedance-Based PZT Transducers.
- Published in:
- International Journal of Engineering & Technology Innovation, 2019, v. 9, n. 4, p. 302
- By:
- Publication type:
- Article
To Design a Network That Delivers Reliable Performance 24 Hours a Day 7 Days a Week for Higher Education in Uganda.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2020, v. 6, n. 22, p. 1, doi. 10.4108/eai.5-6-2020.165914
- By:
- Publication type:
- Article
Exploring Mathematical and Computational Concepts for STEM Education in Colleges.
- Published in:
- International Journal of Technology, Knowledge & Society: Annual Review, 2020, v. 16, n. 4, p. 1, doi. 10.18848/1832-3669/CGP/v16i04/1-22
- By:
- Publication type:
- Article
Design and Validation of a Testing 4D Mechatronic System for Measurement and Integrated Control of Processes.
- Published in:
- Machines, 2022, v. 10, n. 12, p. 1209, doi. 10.3390/machines10121209
- By:
- Publication type:
- Article
Childish Fantasies: Age Verification for Social Media Down Under.
- Published in:
- International Policy Digest, 2024, p. 1
- By:
- Publication type:
- Article
Warring Against Encryption: Australia is Coming for Your Communications.
- Published in:
- International Policy Digest, 2024, p. 3
- By:
- Publication type:
- Article
EU and USA: Trans-Atlantic Data Protection Framework for Data Transfers between the EU and the USA.
- Published in:
- Computer Law Review International, 2022, v. 23, n. 2, p. 60, doi. 10.9785/cri-2022-230208
- By:
- Publication type:
- Article
Personal Protection of Privacy in the Information Age.
- Published in:
- Library Philosophy & Practice, 2023, p. 1
- By:
- Publication type:
- Article
Pioneering a Prototype VPN-Based Cloud Strategy for Streamlined Library Management.
- Published in:
- Library Philosophy & Practice, 2023, p. 1
- By:
- Publication type:
- Article
The regulation of internet pornography: What a survey of under‐18s tells us about the necessity for and potential efficacy of emerging legislative approaches.
- Published in:
- Policy & Internet, 2021, v. 13, n. 3, p. 415, doi. 10.1002/poi3.250
- By:
- Publication type:
- Article