Siphon: Towards scalable high-interaction physical honeypots
In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the
security of networked embedded devices. In this work, we propose the SIPHON architecture …
security of networked embedded devices. In this work, we propose the SIPHON architecture …
[PDF][PDF] Study on virtual private network (VPN), VPN's protocols and security
KK Jyothi, BI Reddy - … Journal of Scientific Research in Computer …, 2018 - researchgate.net
When an access-desired network is constructed using public network infrastructure such as
global Internet to connect remote users or regional offices to company's private network is …
global Internet to connect remote users or regional offices to company's private network is …
Extending kubernetes clusters to low-resource edge devices using virtual kubelets
T Goethals, F De Turck… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, containers have gained popularity as a lightweight virtualization technology.
This rise in popularity has gone hand in hand with the adoption of microservice …
This rise in popularity has gone hand in hand with the adoption of microservice …
Fledge: Kubernetes compatible container orchestration on low-resource edge devices
In recent years, containers have quickly gained popularity in the cloud, mostly thanks to their
scalable, ethereal and isolated nature. Simultaneously, edge devices have become …
scalable, ethereal and isolated nature. Simultaneously, edge devices have become …
A secure and distributed message oriented middleware for smart building applications
In the era of the Internet of Things (IoT) and heterogeneous Information and Communication
Technology (ICT) systems, monolithic and proprietary Smart Building (SB) systems are …
Technology (ICT) systems, monolithic and proprietary Smart Building (SB) systems are …
Comparative analysis of site-to-site layer 2 virtual private networks
ST Aung, T Thein - 2020 IEEE Conference on Computer …, 2020 - ieeexplore.ieee.org
Nowadays, many companies have branch offices and connect those offices to the main
office over the Internet using a site-to-site Virtual Private Network connection. Most of these …
office over the Internet using a site-to-site Virtual Private Network connection. Most of these …
Scalability evaluation of VPN technologies for secure container networking
T Goethals, D Kerkhove, B Volckaert… - … on Network and …, 2019 - ieeexplore.ieee.org
For years, containers have been a popular choice for lightweight virtualization in the cloud.
With the rise of more powerful and flexible edge devices, container deployment strategies …
With the rise of more powerful and flexible edge devices, container deployment strategies …
Dynamic setup of IPsec VPNs in service function chaining
This article describes a novel mechanism for the automated establishment of dynamic
Virtual Private Networks (VPN) in the application domain of Network Function Virtualization …
Virtual Private Networks (VPN) in the application domain of Network Function Virtualization …
A comparative study on virtual private networks for future industrial communication systems
The future industrial networks will not be created from scratch. Rather, they will grow from
existing installations without displacing legacy components. The secure integration of these …
existing installations without displacing legacy components. The secure integration of these …
Performance comparison of VPN solutions
L Osswald, M Haeberle, M Menth - 2020 - tobias-lib.ub.uni-tuebingen.de
Virtual Private Networks (VPN) is the state-of-the-art method to build secure connections
between remote hosts over public networks. In times of high-speed connections to the …
between remote hosts over public networks. In times of high-speed connections to the …