Journal articles on the topic 'Virtual private networks (VPN)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Virtual private networks (VPN).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.
Full textKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Full textSudipti Banerjee. and Dr. Rajni Ranjan Singh Makwana. "Virtual Private Network: Survey and Research Challenges." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 211–26. https://doi.org/10.51583/ijltemas.2025.140600028.
Full textNay, Thaker. "Securing Virtual Private Networks Against Cyber Threats Using Feedforward Neural Networks." Babylonian Journal of Networking 2025 (July 21, 2025): 97–105. https://doi.org/10.58496/bjn/2025/008.
Full textKim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.
Full textFu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.
Full textPeng, Kai. "Construction and Exploration of Corporate Virtual Private Networks." Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.
Full textMixon-Baca, Benjamin, Jeffrey Knockel, Diwen Xue, et al. "Attacking Connection Tracking Frameworks as used by Virtual Private Networks." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 109–26. http://dx.doi.org/10.56553/popets-2024-0070.
Full textAnggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.
Full textAbdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.
Full textKande, Santosh Kumar. "VPN Usage Monitoring: Investigating User Browsing Behavior While Connected to VPN to Enhance Network Security." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (2023): 1–2. https://doi.org/10.47363/jaicc/2023(2)411.
Full textManouselis, Nikos, and Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks." Computing Letters 1, no. 3 (2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.
Full textRana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.
Full textAnwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.
Full textNourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.
Full textFatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full textDewi, Sari, and Dwi Yuni Utami. "Implementing Virtual Private Network (VPN) Network Security Using A Mikrotik Router." Journal of Information System, Informatics and Computing 8, no. 2 (2024): 220. https://doi.org/10.52362/jisicom.v8i2.1653.
Full textSalman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textTulegenova, E. N., A. B. Adranova, and K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION." Bulletin of the Korkyt Ata Kyzylorda University 60, no. 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.
Full textGorre, Tejasvi. "Analyzing The Impact of Virtual Private Networks (VPNS) On Online Security Using The DEMATEL Method." Journal of Data Science and Information Technology 1, no. 1 (2024): 10–23. https://doi.org/10.55124/jdit.v1i1.239.
Full textNovanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.
Full textSari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.
Full textS, Sujatha. "Detection of Virtual Private Networks Encrypted Traffic using Machine and Ensemble Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5636–42. http://dx.doi.org/10.22214/ijraset.2024.61288.
Full textLian, Hongbing, and András Faragó. "Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method." ISRN Communications and Networking 2012 (August 23, 2012): 1–9. http://dx.doi.org/10.5402/2012/914953.
Full textZhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.
Full textMiller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.
Full textRendy, Munadi, Dwi Sanjoyo Danu, Perdana Doan, and Adjie Fidar. "Performance analysis of tunnel broker through open virtual private network." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1185–92. https://doi.org/10.12928/TELKOMNIKA.v17i3.12231.
Full textSun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.
Full textFauzan Prasetyo Eka Putra, Yogi Setiawan, Samsul Arifin, and Wahyu Hidayatullah. "Peran VPN dalam Menjaga Privasi Pengguna Jaringan Publik." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 5, no. 1 (2025): 27–33. https://doi.org/10.55606/jitek.v5i1.5834.
Full textAndini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.
Full textLizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Full textUsanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.
Full textMaulidi, A., M. Abdullah, and DW Handani. "Virtual private network (VPN) model for AIS real time monitoring." IOP Conference Series: Earth and Environmental Science 1081, no. 1 (2022): 012028. http://dx.doi.org/10.1088/1755-1315/1081/1/012028.
Full textWardana, Mohammad Ali, Andi Zulkifli Nusri, and Juliandika Juliandika. "Jaringan Virtual Private Network (Vpn) Berbasis Mikrotik Pada Kantor Kecamatan Marioriawa Kabupaten Soppeng." Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) 5, no. 2 (2022): 107–16. http://dx.doi.org/10.57093/jisti.v5i2.135.
Full textMichael Oladipo Akinsanya, Cynthia Chizoba Ekechi, and Chukwuekem David Okeke. "VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS." Engineering Science & Technology Journal 5, no. 4 (2024): 1452–72. http://dx.doi.org/10.51594/estj.v5i4.1076.
Full textSuryantoro, Hari, Adi Sopian, and Dartono Dartono. "PENERAPAN TEKNOLOGI FORTIGATE DALAM PEMBANGUNAN JARINGAN VPN-IP BERBASIS IPSEC." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 1 (2021): 1–7. http://dx.doi.org/10.56486/jeis.vol1no1.64.
Full textSridevi, Sridevi, and Dr Manjaiah D. H. Dr.Manjaiah D.H. "Technical Overview of Virtual Private Networks(VPNs)." International Journal of Scientific Research 2, no. 7 (2012): 93–96. http://dx.doi.org/10.15373/22778179/july2013/32.
Full textSulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.
Full textMaryanto, Maryanto, Maisyaroh Maisyaroh, and Budi Santoso. "Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 2 (2018): 179–88. http://dx.doi.org/10.33558/piksel.v6i2.1508.
Full textMusril, Hari Antoni. "Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, no. 2 (2019): 83–88. http://dx.doi.org/10.30743/infotekjar.v3i2.1055.
Full textTalib, Hasanien Ali, Raya Basil Alothman, and Mazin S. Mohammed. "Malicious attacks modelling: a prevention approach for ad hoc network security." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 3 (2023): 1856. http://dx.doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.
Full textHasanien, Ali Talib, Basil Alothman Raya, and S. Mohammed Mazin. "Malicious attacks modelling: a prevention approach for ad hoc network security." Malicious attacks modelling: a prevention approach for ad hoc network security 30, no. 3 (2023): 1856–65. https://doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.
Full textAriyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.
Full textPutra, Dwi Prastantio. "ANALISIS KEAMANAN VOICE OVER INTERNET PROTOCOL (VOIP) OVER VIRTUAL PRIVATE NETWORK (VPN)." Jurnal Informatika dan Rekayasa Perangkat Lunak 2, no. 3 (2021): 324–33. http://dx.doi.org/10.33365/jatika.v2i3.1232.
Full textRosyidah, Aliyyah, and Jumadi Mabe Parenreng. "Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)." Internet of Things and Artificial Intelligence Journal 3, no. 3 (2023): 239–49. http://dx.doi.org/10.31763/iota.v3i3.613.
Full textVimal, Kumar V., and C. Abdul Majeed K. "E-resources sharing through Linux based Virtual Private Network (VPN): a case study." Annals of Library and Information Studies 65, no. 3 (2020): 156–59. https://doi.org/10.5281/zenodo.4393149.
Full textZhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.
Full textSari, Linna Oktaviana, and Helena Helena. "Implementasi Virtual Private Network MenggunakanLayer 2 Tunneling Protocol Berbasis Mikrotik." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 4 (2024): 1496–504. https://doi.org/10.57152/malcom.v4i4.1651.
Full textZhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.
Full text