Journal articles on the topic 'Virtual Private Network (VPN)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Virtual Private Network (VPN).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.
Full textKim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.
Full textSudipti Banerjee. and Dr. Rajni Ranjan Singh Makwana. "Virtual Private Network: Survey and Research Challenges." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 211–26. https://doi.org/10.51583/ijltemas.2025.140600028.
Full textFu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.
Full textKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Full textAnggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.
Full textSari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.
Full textAnwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.
Full textAbdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.
Full textLizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Full textNovanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.
Full textPeng, Kai. "Construction and Exploration of Corporate Virtual Private Networks." Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.
Full textKande, Santosh Kumar. "VPN Usage Monitoring: Investigating User Browsing Behavior While Connected to VPN to Enhance Network Security." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (2023): 1–2. https://doi.org/10.47363/jaicc/2023(2)411.
Full textNourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.
Full textMaryanto, Maryanto, Maisyaroh Maisyaroh, and Budi Santoso. "Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 2 (2018): 179–88. http://dx.doi.org/10.33558/piksel.v6i2.1508.
Full textRendy, Munadi, Dwi Sanjoyo Danu, Perdana Doan, and Adjie Fidar. "Performance analysis of tunnel broker through open virtual private network." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1185–92. https://doi.org/10.12928/TELKOMNIKA.v17i3.12231.
Full textMaulidi, A., M. Abdullah, and DW Handani. "Virtual private network (VPN) model for AIS real time monitoring." IOP Conference Series: Earth and Environmental Science 1081, no. 1 (2022): 012028. http://dx.doi.org/10.1088/1755-1315/1081/1/012028.
Full textWardana, Mohammad Ali, Andi Zulkifli Nusri, and Juliandika Juliandika. "Jaringan Virtual Private Network (Vpn) Berbasis Mikrotik Pada Kantor Kecamatan Marioriawa Kabupaten Soppeng." Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) 5, no. 2 (2022): 107–16. http://dx.doi.org/10.57093/jisti.v5i2.135.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full textDewi, Sari, and Dwi Yuni Utami. "Implementing Virtual Private Network (VPN) Network Security Using A Mikrotik Router." Journal of Information System, Informatics and Computing 8, no. 2 (2024): 220. https://doi.org/10.52362/jisicom.v8i2.1653.
Full textAndini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.
Full textS, Sujatha. "Detection of Virtual Private Networks Encrypted Traffic using Machine and Ensemble Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5636–42. http://dx.doi.org/10.22214/ijraset.2024.61288.
Full textFatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textMiller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.
Full textSalman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textZhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.
Full textRana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.
Full textSulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.
Full textMusril, Hari Antoni. "Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, no. 2 (2019): 83–88. http://dx.doi.org/10.30743/infotekjar.v3i2.1055.
Full textKher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.
Full textUsanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.
Full textZhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.
Full textAriyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.
Full textSari, Linna Oktaviana, and Helena Helena. "Implementasi Virtual Private Network MenggunakanLayer 2 Tunneling Protocol Berbasis Mikrotik." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 4 (2024): 1496–504. https://doi.org/10.57152/malcom.v4i4.1651.
Full textGustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.
Full textManouselis, Nikos, and Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks." Computing Letters 1, no. 3 (2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.
Full textLian, Hongbing, and András Faragó. "Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method." ISRN Communications and Networking 2012 (August 23, 2012): 1–9. http://dx.doi.org/10.5402/2012/914953.
Full textHidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Full textErielle, DC. Bitbit, Anthony B. Gampoy Mark, S. Ricafort Therese, et al. "Crafting a Network Plan for a Microfinancing Establishment and Its Branch Network through Virtual Private Network (VPN) Implementation." European Journal of Theoretical and Applied Sciences 1, no. 3 (2023): 441–48. https://doi.org/10.59324/ejtas.2023.1(3).43.
Full textTulegenova, E. N., A. B. Adranova, and K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION." Bulletin of the Korkyt Ata Kyzylorda University 60, no. 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.
Full textVimal, Kumar V., and C. Abdul Majeed K. "E-resources sharing through Linux based Virtual Private Network (VPN): a case study." Annals of Library and Information Studies 65, no. 3 (2020): 156–59. https://doi.org/10.5281/zenodo.4393149.
Full textSuryantoro, Hari, Adi Sopian, and Dartono Dartono. "PENERAPAN TEKNOLOGI FORTIGATE DALAM PEMBANGUNAN JARINGAN VPN-IP BERBASIS IPSEC." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 1 (2021): 1–7. http://dx.doi.org/10.56486/jeis.vol1no1.64.
Full textRosyidah, Aliyyah, and Jumadi Mabe Parenreng. "Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)." Internet of Things and Artificial Intelligence Journal 3, no. 3 (2023): 239–49. http://dx.doi.org/10.31763/iota.v3i3.613.
Full textGinting, Jafaruddin Gusti Amri, Bongga Arifwidodo, and Eka Wahyudi. "Virtual Privat Network: Koneksi Keamanan Pada Aplikasi Berbasis Android." Journal of Telecommunication Electronics and Control Engineering (JTECE) 7, no. 1 (2025): 32–42. https://doi.org/10.20895/jtece.v7i1.1632.
Full textArzieva, J., and N. Nukusbaev. "Network Security Issues and Effective Protection Against Network Attacks." Bulletin of Science and Practice 7, no. 9 (2021): 479–85. http://dx.doi.org/10.33619/2414-2948/70/45.
Full textArfind, Reza, Hendra Supendar, and Riza Fahlapi. "Perancangan Virtual Private Network Dengan Metode PPTP Menggunakan Mikrotik." Jurnal Komputer Antartika 1, no. 3 (2023): 108–16. https://doi.org/10.70052/jka.v1i3.28.
Full textTrihadi, Siswa, Frenky Budianto, and Wirriyanto Arifin. "PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI." CommIT (Communication and Information Technology) Journal 2, no. 1 (2008): 25. http://dx.doi.org/10.21512/commit.v2i1.488.
Full textPutra, Dwi Prastantio. "ANALISIS KEAMANAN VOICE OVER INTERNET PROTOCOL (VOIP) OVER VIRTUAL PRIVATE NETWORK (VPN)." Jurnal Informatika dan Rekayasa Perangkat Lunak 2, no. 3 (2021): 324–33. http://dx.doi.org/10.33365/jatika.v2i3.1232.
Full textHassan, Aslinda, Muhammad Helmi Aqmar Mat Rawi, Mohd Zaki Mas’ud, Maisarah Abu, Zahriladha Zakaria, and Fatemeh Mansourkiaie. "QoS Performance Evaluation of IoT-based Virtual Private Network for UAV Video." Journal of Physics: Conference Series 2319, no. 1 (2022): 012022. http://dx.doi.org/10.1088/1742-6596/2319/1/012022.
Full textLiu, Tao. "Application and Study of Virtual Private Network Base on L2TP-IPSec." Advanced Materials Research 1044-1045 (October 2014): 1071–74. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1071.
Full text