Journal articles on the topic 'DHCP-server'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'DHCP-server.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kadafi, Muamar, and Khusnawi Khusnawi. "Analisis Rogue DHCP Packets Menggunakan Wireshark Network Protocol Analyzer." Creative Information Technology Journal 2, no. 2 (2015): 165. http://dx.doi.org/10.24076/citec.2015v2i2.46.
Full textPradana, Dio Aditya, and Ade Surya Budiman. "The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack." IJID (International Journal on Informatics for Development) 10, no. 1 (2021): 38–46. http://dx.doi.org/10.14421/ijid.2021.2287.
Full textManeka, Alex Dangi, and Marak Luta Lapu Kahewu. "Analisis Keamanan Jaringan Local Area Network Perpustakaan Universitas Kristen Wira Wancana Sumba Mengunakan DHCP server Berbasic Cisco Packet Tracer." Reputasi: Jurnal Rekayasa Perangkat Lunak 2, no. 1 (2021): 42–47. http://dx.doi.org/10.31294/reputasi.v2i1.384.
Full textSaputra, Brian Rinanto. "Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping Dan VLAN Mengggunakan CISCO." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 4 (2022): 3481–88. http://dx.doi.org/10.35957/jatisi.v9i4.2730.
Full textPurun, Elisa Stefano Franli, and Dian Widiyanto Chandra. "Analisis Keamanan DHCP Menggunakan RADIUS Accounting." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 9, no. 3 (2025): 906–12. https://doi.org/10.35870/jtik.v9i3.3667.
Full textAhmad Zaki Hamidi, Eki, Mufid Ridlo Effendi, and Nanang Ismail. "The Implementation of DHCP Relay Using Pox Controller on Openflow Protocol." International Journal of Engineering & Technology 7, no. 2.29 (2018): 821. http://dx.doi.org/10.14419/ijet.v7i2.29.14264.
Full textBuamona, Nur Qamar, Mustamin Hamid, and Erwin Gunawan. "Analisis Dan Implmentasi Keamanan Jaringan Menggunakan Metode DHCP Snooping dan Swirch Port Security." Jurnal Teknik Informatika (J-Tifa) 6, no. 1 (2023): 23–31. http://dx.doi.org/10.52046/j-tifa.v6i2.1680.
Full textMarzuki, Khairan, Mia Mubiatma, and Raisul Azhar. "OTOMASI MANAJEMEN VLAN INTERVLAN DAN DHCP SERVER PADA CISCO MENGGUNAKAN ANSIBLE." Jurnal Informatika dan Rekayasa Elektronik 4, no. 2 (2021): 171–80. http://dx.doi.org/10.36595/jire.v4i2.461.
Full textRazaque, Abdul, and Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment." Journal of Communications and Computer Engineering 3, no. 1 (2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.
Full textTrombeta, Lucas, and Nunzio Torrisi. "DHCP Hierarchical Failover (DHCP-HF) Servers over a VPN Interconnected Campus." Big Data and Cognitive Computing 3, no. 1 (2019): 18. http://dx.doi.org/10.3390/bdcc3010018.
Full textAriyadi, Tamsir, Aidil Nur Riyansyah, M. Agung, and M. Alzi Ikrar. "ANALISIS SERANGAN DHCP STARVATION ATTACK PADA ROUTER OS MIKROTIK." JURNAL ILMIAH INFORMATIKA 11, no. 01 (2023): 85–93. http://dx.doi.org/10.33884/jif.v11i01.7162.
Full textAriyadi, Tamsir. "Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)." INOVTEK Polbeng - Seri Informatika 3, no. 2 (2018): 147. http://dx.doi.org/10.35314/isi.v3i2.455.
Full textYakubu, Bello Musa, Majid Iqbal Khan, and Pattarasinee Bhattarakosol. "IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 80. http://dx.doi.org/10.3390/jsan11040080.
Full textPermana Putra, Willy, and Muhamad Zulfikar Azis. "PENGGUNAAN METODE DHCP SNOOPING DALAM MELAKUKAN PENCEGAHAHAN TERHADAP DHCP ROGUE DI LABORATORIUM TEKNIK INFORMATIKA." Journal of Informatics and Computing 2, no. 1 (2023): 48–54. http://dx.doi.org/10.31884/random.v2i1.8.
Full textBoudjit, Saadi, Cédric Adjih, Paul Mühlethaler, and Anis Laouiti. "Duplicate Address Detection and Autoconfiguration in OLSR." JUCS - Journal of Universal Computer Science 13, no. (1) (2007): 4–31. https://doi.org/10.3217/jucs-013-01-0004.
Full textAriya Pramudita and Rushendra Rushendra. "IMPLEMENTATION OF LOAD BALANCING WITH PER CONNECTION CLASSIFIER AND FAILOVER AND UTILIZATION OF TELEGRAM BOT (CASE STUDY : PT TUJUH MEDIA ANGKASA)." Jurnal Teknik Informatika (Jutif) 5, no. 1 (2024): 273–82. https://doi.org/10.52436/1.jutif.2024.5.1.1165.
Full textYosua Nggaba Patimay, Fajar Hariadi, and Raynesta Mikaela Indri Malo. "Implementation of Bridge Filtering to Prevent DHCP Starvation Attack (Case Study: SD Inpres Papindung)." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 2 (2025): 839–46. https://doi.org/10.59934/jaiea.v4i2.761.
Full textDasmen, Rahmat Novrianda, Timur Dali Purwanto, Agung Wahyudi, Muhammad Nazhrun Nabil, and Albirr DoKoety. "Design and Implementation Internet Protocol Version 6 (IPv6) Pada Jaringan Komputer SMP Muhammadiyah 6 Palembang." DoubleClick: Journal of Computer and Information Technology 6, no. 1 (2022): 1. http://dx.doi.org/10.25273/doubleclick.v6i1.11738.
Full textArdianto, Feby, and Eliza Eliza. "PENGGUNAAN MIKROTIK ROUTER SEBAGAI JARINGAN SERVER." JURNAL SURYA ENERGY 1, no. 1 (2016): 24. https://doi.org/10.32502/jse.v1i1.444.
Full textNovianto, Dian, Yohanes Setiawan Japriadi, Lukas Tommy, and Sujono. "MITIGASI DHCP STARVATION ATTACK PADA ROUTERBOARD MIKROTIK DAN PENGARUHNYA TERHADAP PERFORMANSI." Jurnal Ilmiah Informatika Global 15, no. 2 (2024): 52–57. http://dx.doi.org/10.36982/jiig.v15i2.3930.
Full textMarcus, Ronald David, Hudan Eka Rosyadi, and Fandi Yulian Pamuji. "Prototype Sistem Administrasi Dan Keamanan Jaringan Komputer Berbasis DHCP Server Mikrotik." Briliant: Jurnal Riset dan Konseptual 6, no. 3 (2021): 685. http://dx.doi.org/10.28926/briliant.v6i3.630.
Full textWintolo, Hero, Yuliani Indrianingsih, Wahyu Hamdani, and Syafrudin Abdie. "Descriptive Analysis and ANOVA Test with File Sending on Computer Networks Attacked with Rogue's Dynamic Host Configuration Protocol (DHCP)." Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 9, no. 2 (2023): 375–84. https://doi.org/10.26555/jiteki.v9i2.26167.
Full textNishanth, R., David Mishael, Skanda V. Dheeraj, Darshan Y, and Chandra Gowda Naveen. "Hotel Management System, designing and implementing a hotel network." International Journal of Computing Learning and Intelligence 3, no. 1 (2024): 169–76. https://doi.org/10.5281/zenodo.10634539.
Full textYalestia Chandrawaty, Ni Made Anggrena, and I. Putu Hariyadi. "Implementasi Ansible Playbook Untuk Mengotomatisasi Manajemen Konfigurasi VLAN Berbasis VTP Dan Layanan DHCP." Jurnal Bumigora Information Technology (BITe) 3, no. 2 (2021): 107–22. http://dx.doi.org/10.30812/bite.v3i2.1577.
Full textSalau, Ayodeji Olalekan, Tsehay Admassu Assegie, Adedeji Tomide Akindadelo, and Joy Nnenna Eneh. "Evaluation of Bernoulli Naive Bayes model for detection of distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1203–8. http://dx.doi.org/10.11591/eei.v12i2.4020.
Full textAyodeji, Olalekan Salau, Admassu Assegie Tsehay, Tomide Akindadelo Adedeji, and Nnenna Eneh Joy. "Evaluation of Bernoulli Naive Bayes model for detection of distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1203~1208. https://doi.org/10.11591/eei.v12i2.4020.
Full textWulandari, Heni, Suherman Suherman, and Razali Razali. "PELATIHAN ADMINISTRASI SISTEM JARINGAN BERBASIS WINDOWS PADA GURU DAN SISWA (STUDI KASUS: SEKOLAH SMK MADANI MARENDAL I)." RESWARA: Jurnal Pengabdian Kepada Masyarakat 3, no. 1 (2022): 185–90. http://dx.doi.org/10.46576/rjpkm.v3i1.1637.
Full textListartha, I. Made Edy. "AUTOMASI WEBSITE BROWSER UNTUK MELAKUKAN AUTOLOGIN KE DALAM CAPTIVE PORTAL." Jurnal Ilmiah Informatika Komputer 25, no. 2 (2020): 98–106. http://dx.doi.org/10.35760/ik.2020.v25i2.2766.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full textMonteiro, Claudio de Castro, Paulo Roberto de Lira Gondim, and Vinícius de Miranda Rios. "Seamless Video Session Handoff between WLANs." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–7. http://dx.doi.org/10.1155/2010/602973.
Full textMuhammad Arifin, Fikri, Giva Andriana Mutiara, and Ismail Ismail. "Implementation of Management and Network Security Using Endian UTM Firewall." IJAIT (International Journal of Applied Information Technology) 1, no. 02 (2017): 43–51. http://dx.doi.org/10.25124/ijait.v1i02.874.
Full textRendro, Dwi Bayu, Muhammad Rifqi Farhan, Saleh Dwiyatno, and Ngatono. "Rancang Bangun Sistem Voice Over Internet Protocol Pada Local Area Network Berbasis Software Mini Sip Server." Jurnal Teknik AMATA 3, no. 2 (2022): 36–50. http://dx.doi.org/10.55334/jtam.v3i2.306.
Full textHendrastuty, Nirwana, M. Ghufron An’Ars, Damayanti Damayanti, et al. "PELATIHAN JARINGAN KOMPUTER (MICROTIK) UNTUK MENAMBAH KEAHLIAN BAGI SISWA SMAN 8 BANDAR LAMPUNG." Journal of Social Sciences and Technology for Community Service (JSSTCS) 3, no. 2 (2022): 209. http://dx.doi.org/10.33365/jsstcs.v3i2.2105.
Full textS, Dr Swapna. "Advanced Threat Detection with Active Directory and SIEM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2799–805. https://doi.org/10.22214/ijraset.2025.68478.
Full textWidyastuti, Indriyani, and Yayan Hendrian. "Pemanfaatan VLAN Untuk Meningkatkan Kinerja Jaringan Komputer BKPP Kabupaten Bogor." Computer Science (CO-SCIENCE) 2, no. 1 (2022): 10–18. http://dx.doi.org/10.31294/coscience.v2i1.894.
Full textManjinder, Singh* Charanjit Singh. "MULTI TENANCY SECURITY IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 452–58. https://doi.org/10.5281/zenodo.438116.
Full textNarwal, Priti, Deepak Kumar, Shailendra Narayan Singh, and Peeyush Tewari. "Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud." Journal of Information Technology Research 14, no. 4 (2021): 45–57. http://dx.doi.org/10.4018/jitr.2021100104.
Full textClark, Barry, Bartosz Wachowiak, Ewan W. Crawford, Zenon Jakubowski, and Janusz Kabata. "LIS–lnterlink—connecting laboratory information systems to remote primary health–care centres via the Internet." Journal of Automatic Chemistry 20, no. 3 (1998): 77–81. http://dx.doi.org/10.1155/s1463924698000091.
Full textNusri, Andi Zulkifli, and Rezky Erwin Syah. "Analisis Trafik Jaringan Menggunakan Wireshark Untuk Meningkatkan Kinerja Jaringan Pada Smk 3 Soppeng." Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) 8, no. 1 (2025): 114–22. https://doi.org/10.57093/jisti.v8i1.281.
Full textErsoy Cangir, Özge, Mustafa Yıldırım, and Nurgül Bostan. "Faculty network system implementation using cisco packet tracer." Journal of Computer & Electrical and Electronics Engineering Sciences 1, no. 1 (2023): 20–24. http://dx.doi.org/10.51271/jceees-0005.
Full textSeftian, M. Gilang, Muhammad Wildan, and Dicky Pratama. "Perancangan Jaringan LAN dengan Server Cloud Storage: Studi Kasus Menggunakan Cisco Packet Tracer." Jurnal Sistem Informasi, Manajemen dan Teknologi Informasi 3, no. 1 (2025): 54–63. https://doi.org/10.33020/jsimtek.v3i1.804.
Full textFauzan, Rifqi, Syariful Ikhwan, and Jafaruddin Gusti Amri Ginting. "ANALYSIS PERFORMANCE IN SOFTWARE DEFINED NETWORK (SDN) USING ARUBA VAN CONTROLLER." Jurnal Informatika: Jurnal Pengembangan IT 5, no. 3 (2020): 64–69. http://dx.doi.org/10.30591/jpit.v5i3.1937.
Full textFariz, Fariz, Henry Saptono, and April Rustianto. "Analisis Tingkat Efisiensi pada Konfigurasi Mikrotik Hotspot menggunakan Metode Zero Touch Provisioning." Jurnal Informatika Terpadu 7, no. 2 (2021): 47–52. http://dx.doi.org/10.54914/jit.v7i2.333.
Full textSamuel, Rajula Angelin, and D. Shalini Punithavathani. "Designing a New Scalable Autoconfiguration Protocol with Optimal Header Selection for Large Scale MANETs." Journal of Circuits, Systems and Computers 29, no. 05 (2019): 2050068. http://dx.doi.org/10.1142/s0218126620500681.
Full textLarosa, Fati Gratianus Nafiri, and Ofelius Laia. "ANALISIS QUALITY OF SERVICE (QoS) LIVE STREAMING WIRELESS IP CAMERA XONZ BERBASIS SMARTPHONE ANDROID." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 5, no. 2 (2019): 17–24. http://dx.doi.org/10.46880/mtk.v5i2.422.
Full textHariyadi, I. Putu, I. Made Yadi Dharma, Raisul Azhar, and Suriyati Suriyati. "Implementasi Software-Defined Network Terintegrasi Firewall pada Proxmox untuk Pengontrolan Konfigurasi Jaringan dan Pengamanan Layanan Container." JTIM : Jurnal Teknologi Informasi dan Multimedia 7, no. 1 (2025): 107–22. https://doi.org/10.35746/jtim.v7i1.644.
Full textIvana Lucia Kharisma and Mayang Selpiyana. "Pembelajaran Konfigurasi Mikrotik Berbasis Model OSI Layer di PT Proxi Jaringan Nusantara." Aksi Nyata : Jurnal Pengabdian Sosial dan Kemanusiaan 2, no. 1 (2024): 25–30. https://doi.org/10.62383/aksinyata.v2i1.977.
Full textFaizah, Siti, Eni Pudjiarti, and Andi Saryoko. "Perancangan Jaringan Dengan Menggunakan Static Routing Dan VPN PPTP Pada SMK Bina Putra." BINA INSANI ICT JOURNAL 9, no. 1 (2022): 53. http://dx.doi.org/10.51211/biict.v9i1.1728.
Full textSiregar, Jonathan Daniel, and Ahmad Chusyairi. "Implementasi Authentication Captive Portal Pada Wireless Local Area Network di PT. St. Morita Industries." Jikom: Jurnal Informatika dan Komputer 14, no. 1 (2024): 14–24. http://dx.doi.org/10.55794/jikom.v14i1.119.
Full textLeksono, Ilham Nur, and Tommi Alfian Armawan Sandi. "OPTIMALISASI JARINGAN WAN BERBASIS MIKROTIK (STUDI KASUS : ROBOTIC LABORATORY BOGOR)." Jusikom : Jurnal Sistem Komputer Musirawas 4, no. 02 (2019): 100–110. http://dx.doi.org/10.32767/jusikom.v4i2.628.
Full text