Journal articles on the topic 'File transfer protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'File transfer protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yogadharani, M., R. Sathishwar, Kamil M. Mohamed, Selavan K. Anbu, and M. Vinoth. "Gen AI Based File Transfer Using Protocols." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2024): 675–79. https://doi.org/10.5281/zenodo.14539933.
Full textMuppa, Naveen. "Secure File Transfer Protocol Using Kiteworks." International Journal of Science and Research (IJSR) 11, no. 11 (2022): 1520–23. http://dx.doi.org/10.21275/sr24430150631.
Full textMakushin, A. V., and A. P. Sinyavina. "COMPARISON OF FILE TRANSFER PROTOCOL AND HYPERTEXT TRANSFER PROTOCOL FOR FILE TRANSFER IN A NETWORK WITH INTERFERENCE." International Journal of Applied and Fundamental Research (Международный журнал прикладных и фундаментальных исследований), no. 4 2025 (2025): 38–42. https://doi.org/10.17513/mjpfi.13717.
Full textRajapandian, P., Gubbala Nagendra Prasad, and A. Thamizh priyan. "PRIVATE LINK TRANSFER HUB: A SECURE PROTOCOL FOR PRIVATE FILE TRANSFERS." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem02144.
Full textAnggraini Yolandari, Nezza, Gloria Citra Hasiana Rajagukguk, Romatua Situmorang, and Dedy Kiswanto. "ANALISIS PERFORMA TRANSFER FILE MENGGUNAKAN NETWORK FILE SYSTEM (NFS) DAN FILE TRANSFER PROTOCOL (FTP) PADA RED HAT 9.0." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 6 (2024): 12521–28. https://doi.org/10.36040/jati.v8i6.11988.
Full textDownes, P. K. "Newsgroups/file transfer protocol." British Dental Journal 185, no. 6 (1998): 270–74. http://dx.doi.org/10.1038/sj.bdj.4809790.
Full textTambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.
Full textRajasekaran, G., S. Suman Rajest, R. Regin, M. Mohamed Sameer Ali, and S. Ramesh Kumar. "A Dual-Protocol File Transfer Application: Balancing Speed and Reliability in Peer-to-Peer Networks." International Journal of Human Computing Studies 7, no. 1 (2025): 46–59. https://doi.org/10.31149/ijhcs.v7i1.5467.
Full textTulasiram, Yadavalli. "Optimizing Network Protocol Selection for Managed File Transfer (MFT) Platforms: A Comparative Analysis." Journal of Scientific and Engineering Research 6, no. 5 (2019): 272–79. https://doi.org/10.5281/zenodo.15044812.
Full textRahim, Robbi, Solly Aryza, Pristisal Wibowo, et al. "Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication." International Journal of Engineering & Technology 7, no. 2.13 (2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.13.16917.
Full textPrashanth, Kodurupati. "SFTP Alternatives for Secure File Transfers between Host Server and Clients." Journal of Scientific and Engineering Research 7, no. 10 (2020): 221–24. https://doi.org/10.5281/zenodo.11216412.
Full textAggarwal, S., K. Sabnani, and B. Gopinath. "A New File Transfer Protocol." AT&T Technical Journal 64, no. 10 (1985): 2387–411. http://dx.doi.org/10.1002/j.1538-7305.1985.tb00009.x.
Full textRajendraprasad, Chittimalla. "Optimizing SFTP File Transfers in IBM Sterling: Addressing the Concurrent Session Limit." European Journal of Advances in Engineering and Technology 10, no. 8 (2023): 84–89. https://doi.org/10.5281/zenodo.13837409.
Full textAfonso, João, Cédric Caffy, Mihai Patrascoiu, et al. "An HTTP REST API for Tape-backed Storage." EPJ Web of Conferences 295 (2024): 01008. http://dx.doi.org/10.1051/epjconf/202429501008.
Full textBertolazzi, Marco, and Carlo Caini. "Mars to Earth Data Downloading: A Directory Synchronization Approach." Future Internet 11, no. 8 (2019): 173. http://dx.doi.org/10.3390/fi11080173.
Full textFebrian, Febrian, and Ade Hastuty. "Penerapan Algoritma Vernam Chiper Pada File Transfer Protocol Server Berbasis Php." Jurnal Sintaks Logika 3, no. 3 (2023): 45–52. http://dx.doi.org/10.31850/jsilog.v3i3.2590.
Full textPradana, Bagus Satria, Reza Pahlevi, and Bowo Sumarjono. "IMPLEMENTASI FTP SERVER DENGAN METODE TRANSFER LAYER SECURITY UNTUK KEAMANAN TRANSFER DATA MENGGUNAKAN CENTOS 5.8." JURNAL COMPUTECH & BISNIS 12, no. 2 (2018): 150–53. https://doi.org/10.5281/zenodo.3373761.
Full textKrishna, Murali, Pradeep Jamwal, K. S. R. Chaitanya, and B. Vinod Kumar. "Secure File Multi Transfer Protocol Design." Journal of Software Engineering and Applications 04, no. 05 (2011): 311–15. http://dx.doi.org/10.4236/jsea.2011.45034.
Full textRuwaida, Devi, and Dian Kurnia. "RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP) DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA." Computer Engineering, Science and System Journal 3, no. 1 (2018): 45. http://dx.doi.org/10.24114/cess.v3i1.8267.
Full textSofyan and Yessy Asri. "Implementation of File Sharing and Remote Desktop Connection (RDC) by Utilizing Local Area Network (LAN)." Jurnal Inotera 9, no. 2 (2024): 314–22. http://dx.doi.org/10.31572/inotera.vol9.iss2.2024.id366.
Full textRobinson, Lyn. "Volume 2, transferring files with file transfer protocol (FTP)." International Journal of Information Management 14, no. 5 (1994): 390–91. http://dx.doi.org/10.1016/0268-4012(94)90082-5.
Full textSubhani, Shaik. "Enhancing Data Security with Secure FTP." European Journal of Advances in Engineering and Technology 9, no. 9 (2022): 56–60. https://doi.org/10.5281/zenodo.11898895.
Full textSahputra, Mahandika Dias, and I. Made Suartana. "Implementasi FTP Server Dengan Performa Secure File Transfer Protocol Berbasis Virtualiasasi Dan Container." Journal of Informatics and Computer Science (JINACS) 6, no. 01 (2024): 284–96. https://doi.org/10.26740/jinacs.v6n01.p284-296.
Full textPosner, E., and Z. Reichstein. "Configurations for File Transfer Protocol Error Protection." IEEE Transactions on Communications 34, no. 3 (1986): 294–97. http://dx.doi.org/10.1109/tcom.1986.1096527.
Full textDaka, J. S. J., and A. J. Waters. "A high performance broadcast file transfer protocol." ACM SIGCOMM Computer Communication Review 18, no. 4 (1988): 274–81. http://dx.doi.org/10.1145/52325.52352.
Full textLiu, Kang, Li Shen Yang, and Yong Li Tang. "The Research and Implementation of Safety Isolation System SNMP Agent." Advanced Materials Research 971-973 (June 2014): 1998–2003. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1998.
Full textM, Indushree, Manjit Kaur, Manish Raj, Shashidhara R, and Heung-No Lee. "Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review." Sensors 22, no. 5 (2022): 1959. http://dx.doi.org/10.3390/s22051959.
Full textNoori Mazher, Alaa, Alyaa Hussain Ali, and Taif Sami Hassan. "Development of an Adaptive File Transfer Protocol (AFTP )." Engineering and Technology Journal 29, no. 11 (2011): 2234–43. http://dx.doi.org/10.30684/etj.29.11.12.
Full textNurhayati, Ade, Risnu Pradana Holiyastuta, and Ade Rahmat Iskandar. "Implementasi Virtual Private Network Pada Jaringan Multi Protocol Label Switching Traffic Engineering." Journal of Informatics and Communication Technology (JICT) 2, no. 1 (2020): 11–18. http://dx.doi.org/10.52661/j_ict.v2i1.47.
Full textHari, Prasad Bomma. "Navigating the Challenges of Data Encryption and Compliance Regulations: FTP vs. SFTP." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 9, no. 5 (2021): 1–6. https://doi.org/10.5281/zenodo.14851241.
Full textVaratnitski, Y. I., and R. A. Rumas. "Architecture of Hardware and Software for Unidirectional Data Transmission in Computer Networks." Doklady BGUIR 21, no. 3 (2023): 96–101. http://dx.doi.org/10.35596/1729-7648-2023-21-3-96-101.
Full textCherckesova, Larisa, Olga Safaryan, Nikolay Boldyrikhin, Boris Akishin, and Vasiliy Yukhnov. "Development of an import–substituting software package for secure file transfer, based on the modified protocol of EL–GAMAL." E3S Web of Conferences 273 (2021): 08049. http://dx.doi.org/10.1051/e3sconf/202127308049.
Full textSeo, Hyungyoon, and Goo Kim. "DASH Live Broadcast Traffic Model: A Time-Bound Delay Model for IP-Based Digital Terrestrial Broadcasting Systems." Applied Sciences 11, no. 1 (2020): 247. http://dx.doi.org/10.3390/app11010247.
Full textWatters, Paul Andrew, and Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development." South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.
Full textMamayeva, Oydinoy Ismoiljon qizi, and Abdulhay Abdulaziz o'g'li Abduqodirov. "HTTP VA FTP PROTOKOLLARIDA ISHLASH UNUMDORLIGINI TAHLILI." GOLDEN BRAIN 1, no. 27 (2023): 24–28. https://doi.org/10.5281/zenodo.8411892.
Full textEvans, Neil, and Helen Treharne. "Investigating a file transfer protocol using CSP and B." Software & Systems Modeling 4, no. 3 (2005): 258–76. http://dx.doi.org/10.1007/s10270-005-0084-3.
Full textMoskvichev, Anton, and Ksenia Moskvicheva. "Using DNS Tunneling to Transfer Malicious Software." Voprosy kiberbezopasnosti, no. 4(50) (2022): 91–99. http://dx.doi.org/10.21681/2311-3456-2022-4-91-99.
Full textPartyka, Olha, Bohdan Fihol, and Taras Nakonechnyi. "INTEGRATED APPROACH TO DETECTING BLUETOOTH THREATS USING WIRESHARK AND SPLUNK SIEM." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 223–34. https://doi.org/10.28925/2663-4023.2024.26.684.
Full textLiu, Chun, and Kun Tan. "Research and Implementation of the Secure Database-Update Mechanism." Applied Mechanics and Materials 513-517 (February 2014): 1752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1752.
Full textWei, Chong Yu, Zu Ping Gu, and Shuai Huang. "The Application of an SD Card in Debugging an Embedded System." Advanced Materials Research 468-471 (February 2012): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1622.
Full textArman, Molavi. "Rancang Bangun Pengamanan FTP Server dengan Menggunakan Secure Sockets Layer." JURNAL INTEGRASI 9, no. 1 (2017): 16. http://dx.doi.org/10.30871/ji.v9i1.272.
Full textBracke, Stephan, Alexandre Gonsette, Jean Rasson, Antoine Poncelet, and Olivier Hendrickx. "Automated observatory in Antarctica: real-time data transfer on constrained networks in practice." Geoscientific Instrumentation, Methods and Data Systems 6, no. 2 (2017): 285–92. http://dx.doi.org/10.5194/gi-6-285-2017.
Full textJi, Hong. "Research on Communication Automation with Design and Implementation of FTP Based on Serv-U." Advanced Materials Research 738 (August 2013): 276–79. http://dx.doi.org/10.4028/www.scientific.net/amr.738.276.
Full textUgaz, Walter Antonio Campos, Maria del Rocío Hende Santolaya, Handry Martín Rodas Purizaga, et al. "Hybrid Internet Architecture and Protocol (HIAP): A Self-Evolving and Transformative Framework for Enabling Seamless Real-Time Applications and Secure Peer-to-Peer File Sharing in the Internet of Everything (IoE)." Journal of Internet Services and Information Security 13, no. 3 (2023): 58–77. http://dx.doi.org/10.58346/jisis.2023.i3.005.
Full textKonala, Pandu Ranga Reddy, V. SaiAbhinav Reddy, D. Krishna Chaitanya Varma, and Radhika G. "Access mechanism using inter planetary file system." International Journal of Engineering & Technology 7, no. 4 (2019): 5142–46. http://dx.doi.org/10.14419/ijet.v7i4.25030.
Full textAhn, Jae-Won, Beom-Jin Choi, Sung-Jin Ok, Jung-Ha Kang, Jae-Young Kim, and Eun-Gi Kim. "Design and implementation of file transfer protocol supporting security functionalities." Journal of the Korea Academia-Industrial cooperation Society 15, no. 5 (2014): 3086–92. http://dx.doi.org/10.5762/kais.2014.15.5.3086.
Full textPratama, Redo, Mira Orisa, and FX Ariwibisono. "APLIKASI MONITORING DAN CONTROLLING SERVER MENGGUNAKAN PROTOCOL ICMP (INTERNET CONTROL MESSAGE PROTOCOL) DAN SSH (SECURE SHELL) BERBASIS WEBSITE." JATI (Jurnal Mahasiswa Teknik Informatika) 4, no. 1 (2020): 397–403. http://dx.doi.org/10.36040/jati.v4i1.2310.
Full textWintolo, Hero, Yuliani Indrianingsih, Wahyu Hamdani, and Syafrudin Abdie. "Descriptive Analysis and ANOVA Test with File Sending on Computer Networks Attacked with Rogue's Dynamic Host Configuration Protocol (DHCP)." Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 9, no. 2 (2023): 375–84. https://doi.org/10.26555/jiteki.v9i2.26167.
Full textSangeetha, J., Keerthiraj Nagaraj, K. N. Balasubramanya Murthy, and Ram P. Rustagi. "A New Approach for Analyzing the Performance of the WiMAX Networks based on QoS Traffic Prediction Routing Protocol using Gene Expression Programming." International Journal of Applied Metaheuristic Computing 7, no. 2 (2016): 16–38. http://dx.doi.org/10.4018/ijamc.2016040102.
Full textMurray, Steven, Mihai Patrascoiu, Luca Mascetti, Joao Pedro Lopes, Shubhangi Misra, and Eraldo Silva Junior. "FTS Service Evolution and LHC Run-3 Operations." EPJ Web of Conferences 295 (2024): 01031. http://dx.doi.org/10.1051/epjconf/202429501031.
Full text