Zeitschriftenartikel zum Thema „Virtual Private Network“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Virtual Private Network" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (August 31, 2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.
Der volle Inhalt der QuelleKnapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (January 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.
Der volle Inhalt der QuelleWright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (July 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.
Der volle Inhalt der QuelleKennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (October 1, 2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.
Der volle Inhalt der QuelleScott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.
Der volle Inhalt der QuelleAnggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (May 16, 2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.
Der volle Inhalt der QuelleKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Der volle Inhalt der QuelleTAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (November 1, 2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.
Der volle Inhalt der QuelleSobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.
Der volle Inhalt der QuelleCrocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (January 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.
Der volle Inhalt der QuelleSu, Y., Y. Tian, E. Wong, N. Nadarajah, and C. C. K. Chan. "All-optical virtual private network in passive optical networks." Laser & Photonics Review 2, no. 6 (December 11, 2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.
Der volle Inhalt der QuelleFu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (July 8, 2024): 2674. http://dx.doi.org/10.3390/electronics13132674.
Der volle Inhalt der QuelleRana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (April 1, 2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.
Der volle Inhalt der Quelle., Ekwe O. A. "VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY." International Journal of Research in Engineering and Technology 03, no. 05 (May 25, 2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.
Der volle Inhalt der QuelleKhan, Yusera Farooq. "Cisco Secured Virtual Private Networks: A Review." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 30–33. http://dx.doi.org/10.51983/ajcst-2018.7.2.1886.
Der volle Inhalt der QuelleFaizal, Faizal, and Andi Irmayana. "Sistem Persuratan Digital Berbasis Virtual Private Network." DoubleClick: Journal of Computer and Information Technology 5, no. 1 (August 31, 2021): 33. http://dx.doi.org/10.25273/doubleclick.v5i1.9121.
Der volle Inhalt der QuelleChou, David C., David C. Yen, and Amy Y. Chou. "Adopting virtual private network for electronic commerce." Industrial Management & Data Systems 105, no. 2 (February 2005): 223–36. http://dx.doi.org/10.1108/02635570510583343.
Der volle Inhalt der QuelleKeng Lim, L., Jun Gao, T. S. Eugene Ng, Prashant R. Chandra, Peter Steenkiste, and Hui Zhang. "Customizable virtual private network service with QoS." Computer Networks 36, no. 2-3 (July 2001): 137–51. http://dx.doi.org/10.1016/s1389-1286(01)00173-6.
Der volle Inhalt der QuelleEisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." SIAM Journal on Computing 37, no. 3 (January 2007): 706–21. http://dx.doi.org/10.1137/060654827.
Der volle Inhalt der QuelleAltın, A., E. Amaldi, P. Belotti, and M. Ç. Pınar. "Virtual Private Network Design Under Traffic Uncertainty." Electronic Notes in Discrete Mathematics 17 (October 2004): 19–22. http://dx.doi.org/10.1016/j.endm.2004.03.007.
Der volle Inhalt der QuelleKang, Sunyoung, Hyuncheol Kim, and Seungae Kang. "Virtual private network for wellness sports information." Multimedia Tools and Applications 74, no. 16 (June 24, 2014): 6497–507. http://dx.doi.org/10.1007/s11042-014-2096-x.
Der volle Inhalt der QuelleLizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Der volle Inhalt der QuelleYu, Wei, and Jian Wang. "Scalable network resource management for large scale Virtual Private Networks." Simulation Modelling Practice and Theory 12, no. 3-4 (July 2004): 263–85. http://dx.doi.org/10.1016/j.simpat.2004.02.002.
Der volle Inhalt der QuelleKande, Santosh Kumar. "VPN Usage Monitoring: Investigating User Browsing Behavior While Connected to VPN to Enhance Network Security." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (March 31, 2023): 1–2. https://doi.org/10.47363/jaicc/2023(2)411.
Der volle Inhalt der QuelleMarzuki, Khairan, Muhammad Idham Kholid, I. Putu Hariyadi, and Lalu Zazuli Azhar Mardedi. "Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment." International Journal of Electronics and Communications Systems 3, no. 1 (June 28, 2023): 11. http://dx.doi.org/10.24042/ijecs.v3i1.16524.
Der volle Inhalt der QuelleEkawati, Inna, and Dadan Irwan. "Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik." JREC (Journal of Electrical and Electronics) 9, no. 1 (November 25, 2021): 41–48. http://dx.doi.org/10.33558/jrec.v9i1.3110.
Der volle Inhalt der QuelleAbdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (November 10, 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.
Der volle Inhalt der QuelleImmidisetti, Venkata Raman. "Azure private DNS zones: Architecture, Implementation Best Practices, And Organizational Use Cases." International Journal of Multidisciplinary Research and Growth Evaluation. 2, no. 6 (2021): 446–49. https://doi.org/10.54660/.ijmrge.2021.2.6.446-449.
Der volle Inhalt der QuelleSpiekermann, Daniel, Tobias Eggendorfer, and Jörg Keller. "Deep Learning for Network Intrusion Detection in Virtual Networks." Electronics 13, no. 18 (September 11, 2024): 3617. http://dx.doi.org/10.3390/electronics13183617.
Der volle Inhalt der QuelleNagaraj, Rathod, Akkala Abhilasha, and seekoli Avinash. "Amazon virtual private cloud experimental and application." IJRSET MAY Volume 10 Issue 5 10, no. 5 (September 27, 2023): 10–18. https://doi.org/10.5281/zenodo.8382910.
Der volle Inhalt der QuellePatibandla, Kondala Rao. "Design and Create VPC in AWS." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 1, no. 1 (January 22, 2024): 273–82. http://dx.doi.org/10.60087/jaigs.v1i1.208.
Der volle Inhalt der QuelleLota, Stanislaw, and Marcin Markowski. "Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment." Journal of Applied Computer Science Methods 7, no. 2 (November 1, 2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.
Der volle Inhalt der QuelleQu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network." Applied Mechanics and Materials 475-476 (December 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.
Der volle Inhalt der QuelleSari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (July 21, 2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.
Der volle Inhalt der QuelleShi, Baohui. "Computer Network Information Security Protection Based on Virtual Private Network." Journal of Physics: Conference Series 1646 (September 2020): 012121. http://dx.doi.org/10.1088/1742-6596/1646/1/012121.
Der volle Inhalt der QuelleMakhija, Deven. "5G Communication Systems: Network Slicing and Virtual Private Network Architecture." ITM Web of Conferences 54 (2023): 02001. http://dx.doi.org/10.1051/itmconf/20235402001.
Der volle Inhalt der QuelleTimberg, Chris, Leah Liebovitz, and Ben Miller. "The Private Virtual Network Operator Model for Field Area Network." Climate and Energy 40, no. 6 (December 5, 2023): 8–16. http://dx.doi.org/10.1002/gas.22381.
Der volle Inhalt der QuelleKrile, Srecko, and Martin Medvecky. "Virtual Network Construction Technique, Treating All VPNs Simultaneously." Elektronika ir Elektrotechnika 26, no. 2 (April 25, 2020): 77–84. http://dx.doi.org/10.5755/j01.eie.26.2.22981.
Der volle Inhalt der QuelleDayana, D. S. "An Efficient Approach for Network Mobility Based on AES Algorithm." Advanced Materials Research 984-985 (July 2014): 1269–75. http://dx.doi.org/10.4028/www.scientific.net/amr.984-985.1269.
Der volle Inhalt der QuelleMiller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (July 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.
Der volle Inhalt der QuelleBhat, Anjum Zameer, and Imran Ahmed. "A Simulation Environment for enhancing the student experience in advanced networking concepts." SHS Web of Conferences 156 (2023): 07003. http://dx.doi.org/10.1051/shsconf/202315607003.
Der volle Inhalt der QuelleUsanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (July 30, 2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.
Der volle Inhalt der QuelleÁlvarez, David, Pelayo Nuño, Carlos T. González, Francisco G. Bulnes, Juan C. Granda, and Dan García-Carrillo. "Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks." Sensors 23, no. 4 (February 4, 2023): 1747. http://dx.doi.org/10.3390/s23041747.
Der volle Inhalt der QuelleRoşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Der volle Inhalt der QuelleSobh, Tarek S., and Awad H. Khalil. "Securing Wargames System Using Effective Virtual Private Network." Recent Patents on Computer Science 11, no. 4 (December 13, 2018): 289–301. http://dx.doi.org/10.2174/2213275911666181002140451.
Der volle Inhalt der QuelleIryani, Nanda, and Dyas Dendi Andika. "Implementasi Dynamic Multipoint Virtual Private Network Dual Hub." Jurnal Telekomunikasi dan Komputer 11, no. 2 (August 20, 2021): 118. http://dx.doi.org/10.22441/incomtech.v11i2.10839.
Der volle Inhalt der QuelleBen-Yacoub, Leila Lamti. "On managing traffic over virtual private network links." Journal of Communications and Networks 2, no. 2 (June 2000): 138–46. http://dx.doi.org/10.1109/jcn.2000.6596734.
Der volle Inhalt der QuelleSuryani, Erma, and Syamsu Nur Row Honey. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS." JUTI: Jurnal Ilmiah Teknologi Informasi 6, no. 1 (January 1, 2007): 31. http://dx.doi.org/10.12962/j24068535.v6i1.a185.
Der volle Inhalt der QuelleCui, Wei, and Mostafa A. Bassiouni. "Virtual private network bandwidth management with traffic prediction." Computer Networks 42, no. 6 (August 2003): 765–78. http://dx.doi.org/10.1016/s1389-1286(03)00217-2.
Der volle Inhalt der QuelleWu, Jing, Michel Savoie, Scott Campbell, Hanxi Zhang, and Bill Arnaud. "Layer 1 virtual private network management by users." IEEE Communications Magazine 44, no. 12 (December 2006): 86–93. http://dx.doi.org/10.1109/mcom.2006.273104.
Der volle Inhalt der Quelle