Security assessment and evaluation of VPNs: a comprehensive survey
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …
provide confidentiality and anonymity to communication. Despite this enormous and …
[PDF][PDF] Study on virtual private network (VPN), VPN's protocols and security
KK Jyothi, BI Reddy - … Journal of Scientific Research in Computer …, 2018 - researchgate.net
When an access-desired network is constructed using public network infrastructure such as
global Internet to connect remote users or regional offices to company's private network is …
global Internet to connect remote users or regional offices to company's private network is …
Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol
The key point of this paper is to assess and look over the top of the line network layer-based
VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in …
VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in …
VPN: a boon or trap?: a comparative study of MPLs, IPSec, and SSL virtual private networks
Z Zhipeng, S Chandel, S Jingyao… - 2018 Second …, 2018 - ieeexplore.ieee.org
In today's world, the security and privacy of data that travels through the cyberspace have
become an essential concern for the individual users and the organizations. Apart from this …
become an essential concern for the individual users and the organizations. Apart from this …
Futuristic Challenges in Blockchain Technologies
AK Singh, S Saxena, A Tripathi… - Blockchain and Deep …, 2023 - Wiley Online Library
Summary Internet of Things (IoT)‐based services have grown rapidly worldwide, and IoT is
evolving at a very fast pace in industry and research, yet it is still not able to address privacy …
evolving at a very fast pace in industry and research, yet it is still not able to address privacy …
[HTML][HTML] A new cyber risk: how teens expose corporations in WFH era
Z Siyed - Journal of Information Security, 2023 - scirp.org
We analyze the risks associated with teenagers' online activities and the potential migration
of cyber threats originating from teenagers to their parents' work-from-home (WFH) devices …
of cyber threats originating from teenagers to their parents' work-from-home (WFH) devices …
Mvpn: A defense architecture against VPN traffic hijacking based on MTD
Z Gao, F Chen, Y Wang, W He, X Shi, G Xie - Electronics, 2023 - mdpi.com
With the increasing awareness of privacy protection, Virtual Private Networks (VPNs) are
widely used to build a more secure communication tunnel. However, a traffic hijacking attack …
widely used to build a more secure communication tunnel. However, a traffic hijacking attack …
Securing VPN from insider and outsider bandwidth flooding attack
S Shunmuganathan, RD Saravanan… - Microprocessors and …, 2020 - Elsevier
Globalization is the order of the day. Linking globally dispersed corporate offices and
securing the data transferred between them is a critical activity. Virtual Private Network …
securing the data transferred between them is a critical activity. Virtual Private Network …
Dynamic access control method for SDP-based network environments
H You, D Ko, D Kim, R Wong, I Joe - EURASIP Journal on Wireless …, 2023 - Springer
With online work environments and other distributed computing systems—such as cloud
technologies or Internet of Things systems—becoming increasingly popular today due to the …
technologies or Internet of Things systems—becoming increasingly popular today due to the …
Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak
L Einler Larsson, K Qollakaj - 2023 - diva-portal.org
Background. The pandemic outbreak commenced a large migration of employees from all
kinds of industries from previously working in an industrial or office environment to working …
kinds of industries from previously working in an industrial or office environment to working …