Sun Jingyao's research while affiliated with New York Institute of Technology and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (4)


Table 1 . The basic features and main functions of a firewall
Fig. 2. The principle of packet filtering
Fig. 3. The working architecture of a proxy server
Table 5 . The most common attacks on firewall
Fig. 10. WAF working principle
Securing a Network: How Effective Using Firewalls and VPNs Are?
  • Chapter
  • Full-text available

January 2020

·

16,189 Reads

·

12 Citations

Sun Jingyao

·

·

Yu Yunnan

·

[...]

·

With the tremendous amount of increase in cyber threats on the Internet, the security of data traveling over a network has become a significant concern for all the netizens. As a result, a large number of Internet users have started using firewalls and VPN (Virtual Private Network) to ensure more protection for their data on the go. Though mostly considered as defenders of our network security, sometimes firewalls and VPNs can also pose some serious threats to its users. Our research focuses on addressing these security flaws by providing a specific illustration of the working principles and performance of the firewalls and VPNs, including the technologies behind them and their benefits, significant potential risks it may bring due to some considerable loopholes in their architecture, and the possible solutions to those security issues. We hope that our research will bring a better understanding of these security issues and their solution to help users and organizations to deal with these security threats and risks in a better way.

Download
Share



Rapid fabrication of micro structure on polypropylene by plate to plate isothermal hot embossing method

June 2017

·

38 Reads

·

22 Citations

Polymer Engineering and Science

The cycle time of conventional hot embossing can reach as long as 10 min due to its periodically heating and cooling steps. In recent years, researchers around the world had made great efforts to deal with this problem but still some unsolved defects left. To shorten the cycle time and reduce the energy cost therein, we proposed a new type of plate to plate isothermal hot embossing method with a cycle time down to 20 s as practical. The primary difference between two methods was the thermal pattern, that the mold temperature of our new method remained constant and uniform at a relatively low level throughout the whole process. After specific experimental device was designed and built up, polypropylene (PP)-a kind of representative semicrystalline polymer-was chosen as experimental material. In this article, the feasibility and internal mechanism of our method were discussed. The influence of mold temperature, pressure, and holding time on the replication precision of micro V-cuts were studied. Furthermore, a promising application of PP products in the field of microstructure heat exchangers was also introduced briefly.

Citations (4)


... There are also matters of governmental surveillance and censorship. For example, Google has been required to meet government's demands in order to run business in China (Chandel et al. 2019), a situation that is of course undesirable for a company whose business evolves around information sharing. The aforementioned case thus shows the difficulty of running operations in other societal structures. ...

Reference:

PhD thesis Petter Terenius Data centre waste heat: Applications, societies, metrics
The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall

... • Sensitive data exposure: The user likely uses a VPN to protect his private Internet suring activities. However, most free and paid VPNs are equipped with third-party trackers who collect online activities and breach the privacy of users [44]. • Limitations of data usage: Top free VPNs limit the amount of data for their free accounts. ...

Securing a Network: How Effective Using Firewalls and VPNs Are?

... The paper [21] includes a comprehensive description, cloud storage and its primary challenges, solutions for protecting saved private information while in storage, a literature review, methodology, the suggested system, a conclusion, and future enhancements. Other related articles in [22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40] are examined in this study in order to continue the research. ...

VPN: a Boon or Trap? : A Comparative Study of MPLS, IPSec, and SSL Virtual Private Networks

... The processing of the biological simulation shield scale structure mainly relies on direct copy manufacturing. Its preparation methods mainly include micro-imprinting, micro-plastic casting, micro-electroforming, and soft engraving technology [20][21][22][23][24][25][26][27][28]. Comprehensive research on functional surfaces of polymer microstructures at home and abroad, it shows that the key to the preparation of biomimetic microstructures lies in the precise shaping of the structure. ...

Rapid fabrication of micro structure on polypropylene by plate to plate isothermal hot embossing method
  • Citing Article
  • June 2017

Polymer Engineering and Science