H Daryani et al., 2010 - Google Patents
Integrated Security by using MPLS-VPN for Retail-Banking Network: Case study Mehr bank, IranH Daryani et al., 2010
View PDF- Document ID
- 16679223179963216811
- Author
- H Daryani S
- Taslimi P
- Publication year
External Links
Snippet
We would like to express our appreciation to Halmstad University, which provides this opportunity for us to improve our knowledge in a proper way, and special thanks to Olga Torstensson and Tony Larsson. In addition, many thanks to PBS-CE company in Iran, which …
- 238000005516 engineering process 0 description 33
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220060449A1 (en) | System and method for monitoring and securing communications networks and associated devices | |
US9716690B2 (en) | Integrated security switch | |
Sahay et al. | Towards autonomic DDoS mitigation using software defined networking | |
US20060026680A1 (en) | System and method of characterizing and managing electronic traffic | |
US20030004688A1 (en) | Virtual intrusion detection system and method of using same | |
US20020083344A1 (en) | Integrated intelligent inter/intra networking device | |
EP1952257A2 (en) | Propagating black hole shunts to remote routers with split tunnel and ipsec direct encapsulation | |
Holmberg et al. | BACnet wide area network security threat assessment | |
US20090094691A1 (en) | Intranet client protection service | |
Forbacha et al. | Design and implementation of a secure virtual private network over an open network (Internet) | |
Ashraf et al. | SECURE INTER-VLAN IPv6 ROUTING: IMPLEMENTATION & EVALUATION. | |
H Daryani et al. | Integrated Security by using MPLS-VPN for Retail-Banking Network: Case study Mehr bank, Iran | |
Gruhl et al. | A concept for intelligent collaborative network intrusion detection | |
Mwape | Performance evaluation of internet protocol security (IPSec) over multiprotocol label switching (MPLS). | |
Funmilola et al. | Review of Computer Network Security System | |
Soepeno | Comprehensive Network Analysis Through a Single Main Network Architecture | |
Guo et al. | Autonomous decentralized network security system | |
Akyamac et al. | Achieving NERC CIP compliance with secure MPLS networks | |
Achari | Advanced Cybersecurity Tactics | |
Akram et al. | Network Security Configuration for Campus LAN Using CPT | |
Tiamiyu | Trusted routing vs. VPN for secured data transfer over IP-networks/Internet | |
Shorrock et al. | Concert IP Secure—a managed firewall and VPN service | |
Frihat et al. | General guidelines for the security of a large scale data center design | |
Atsemegiorgis | Building a Secure Local Area Network | |
Cisco et al. | Cisco SAFE Solution Overview |