Journal articles on the topic 'Internet (computer network)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet (computer network).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Full textAyu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Full textSakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.
Full textNemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textM.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.
Full textDasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.
Full textAndhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.
Full textSaddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Full textZulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.
Full textGoffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.
Full textAriyadi, Tamsir, Timur Dali Purwanto, and Muhamad Malik Fajar. "IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA." JURNAL ILMIAH INFORMATIKA 11, no. 02 (September 5, 2023): 189–95. http://dx.doi.org/10.33884/jif.v11i02.8032.
Full textBorisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.
Full textSitanggang, Andri Sahata, R. Fenny Syafariani, Novrini Hasti, Febilita Wulan Sari, and Dhara Pasya. "LAN network architecture design at Nurul Jalal Islamic Boarding School, North Jakarta." International Journal of Advances in Applied Sciences 13, no. 1 (March 1, 2024): 123. http://dx.doi.org/10.11591/ijaas.v13.i1.pp123-133.
Full textMagnaye, Nicko A. "Advancements in computer network technologies: A review." Metaverse 5, no. 1 (April 25, 2024): 2315. http://dx.doi.org/10.54517/m.v5i1.2315.
Full textAfrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (September 9, 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.
Full textMahmud, Mahmud, and Yarza Aprizal. "The Penerapan QoS (Quality Of Service) Dalam Menganalisis Kualitas Kinerja Jaringan Komputer (Studi Kasus Hotel Maxone Palembang)." Journal of Information System Research (JOSH) 3, no. 4 (July 31, 2022): 374–79. http://dx.doi.org/10.47065/josh.v3i4.1567.
Full textMulyadi. "PENERAPAN IP VERSI 6 DALAM MEMBANGUN JARINGAN LAN." Jurnal Informatika Komputer, Bisnis dan Manajemen 19, no. 3 (November 20, 2023): 16–26. http://dx.doi.org/10.61805/fahma.v19i3.49.
Full textSanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (January 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.
Full textNoviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.
Full textKeller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.
Full textArmanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau." Jurnal Ilmiah Betrik 10, no. 03 (November 14, 2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.
Full textSubhi, Doaa, and Laszlo Bacsardi. "Using Quantum Nodes Connected via the Quantum Cloud to Perform IoT Quantum Network." Condensed Matter 8, no. 1 (February 23, 2023): 24. http://dx.doi.org/10.3390/condmat8010024.
Full textAdhar, Sandi, and Usep Saprudin. "Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer." JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) 6, no. 1 (January 20, 2023): 23. http://dx.doi.org/10.56327/jtksi.v6i1.1388.
Full textChen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.
Full textHusna, Muhammad Aliyul, and Perani Rosyani. "Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (December 30, 2021): 247. http://dx.doi.org/10.30865/jurikom.v8i6.3631.
Full textFilimonova, N. A., and S. I. Rakin. "Calculation of Data Flow in Local Computer Networks. Combined (Experimental + Computer Simulation) Approach." WSEAS TRANSACTIONS ON COMMUNICATIONS 22 (March 17, 2023): 32–42. http://dx.doi.org/10.37394/23204.2023.22.3.
Full textHart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.
Full textZhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.
Full textBamgbose, Augustine Adeoye. "Internet adoption in select Nigeria university libraries." Information Impact: Journal of Information and Knowledge Management 14, no. 2 (January 9, 2024): 16–33. http://dx.doi.org/10.4314/iijikm.v14i2.2.
Full textCarius, Ana Carolina, Claro Ribeiro Pires, Vanessa Moreira Wendling, and Eduardo Campos Papa. "Resilience in computer networks and personal well-being: Computer engineering at the service of digital life." Conjecturas 21, no. 5 (November 18, 2021): 705–16. http://dx.doi.org/10.53660/conj-317-515.
Full textRaharjo, Mugi, Frengki Pernando, and Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)." Jurnal Teknik Komputer 5, no. 1 (February 11, 2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.
Full textZhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.
Full textOdhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (December 4, 2012): 302–9. http://dx.doi.org/10.48084/etasr.145.
Full textYuliana, Dela, and I. Komang Ari Mogi. "Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 2 (November 24, 2020): 235. http://dx.doi.org/10.24843/jlk.2020.v09.i02.p10.
Full textDzulfikar, Mohammad, Anton Anton, and Fitra Septia Nugraha. "IMPLEMENTATION OF SHARED INTERNET SERVICE COMPUTER NETWORK (RT/RW NET) HOME.NET." Journal of Information System, Informatics and Computing 7, no. 1 (June 19, 2023): 36. http://dx.doi.org/10.52362/jisicom.v7i1.1050.
Full textWan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.
Full textTedyyana, Agus, and Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway." INOVTEK Polbeng - Seri Informatika 3, no. 1 (June 3, 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.
Full textWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (July 24, 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textHuang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 3 (June 26, 2024): p13. http://dx.doi.org/10.22158/sssr.v5n3p13.
Full textHuang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 2 (June 26, 2024): p191. http://dx.doi.org/10.22158/sssr.v5n2p191.
Full textRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Full textWang, Zhi Kun. "Application of Complex Network Theory in Computer Network Topology Optimization Research." Advanced Materials Research 989-994 (July 2014): 4237–40. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4237.
Full textSheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.
Full textSaputro, Bagus Aji. "Network Security Analysis and Bandwidth Management." International Journal of Science, Engineering and Information Technology 5, no. 02 (July 27, 2021): 260–65. http://dx.doi.org/10.21107/ijseit.v5i02.6481.
Full textHoward, Matthew D. "Network security (and the internet)." International Journal of Network Management 5, no. 6 (November 1995): 296–304. http://dx.doi.org/10.1002/nem.4560050604.
Full textUpadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.
Full textGanapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera." American Journal of Trade and Policy 6, no. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.
Full textQian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.
Full text