Journal articles on the topic 'VPN connections'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'VPN connections.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textHarika Rama Tulasi Karatapu and Vishal Gudhka. "Secure hybrid connectivity with private service connects and zero trust on-premises integration." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 4272–90. https://doi.org/10.30574/wjarr.2025.26.2.2108.
Full textHidayat, Sahrul, and Yuma Akbar. "IMPLEMENTASI FAILOVER VPN KANTOR PUSAT DAN CABANG MENGGUNAKAN TEKNOLOGI SDWAN DENGAN STRATEGI BEST QUALITY." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 3 (2023): 1598–608. http://dx.doi.org/10.35870/jimik.v4i3.386.
Full textKher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.
Full textDomakonda, Dileep. "Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN." Eastasouth Journal of Information System and Computer Science 1, no. 02 (2023): 126–31. https://doi.org/10.58812/esiscs.v1i02.513.
Full textHarsapranata, Agni Isador. "IMPLEMENTASI FAILOVER MENGGUNAKAN JARINGAN VPN DAN METRONET PADA ASTRIDOGROUP INDONESIA." CCIT Journal 8, no. 2 (2015): 66–77. http://dx.doi.org/10.33050/ccit.v8i2.321.
Full textRana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.
Full textAlqahtany, Saad Said, and Toqeer Ali Syed. "Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework." Applied Sciences 14, no. 11 (2024): 4421. http://dx.doi.org/10.3390/app14114421.
Full textJain, Rashmi, Mrudula Nimbarte, and Sachin Jain. "Cloud Based Remote Service Provider for Village Empowerment." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 14, no. 01 SPL (2022): 20–24. http://dx.doi.org/10.18090/samriddhi.v14spli01.4.
Full textZakaria, Mohd Idzaney, Mohd Natashah Norizan, Muammar Mohamad Isa, Mohd Faizal Jamlos, and Muslim Mustapa. "Comparative analysis on virtual private network in the internet of things gateways." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 488–97. https://doi.org/10.11591/ijeecs.v28.i1.pp488-497.
Full textC. Deepika. "Systematic Literature Review on VPN Security: Adaptive Multi-Tunnelling as a Mitigation Strategy." Journal of Information Systems Engineering and Management 10, no. 39s (2025): 760–77. https://doi.org/10.52783/jisem.v10i39s.7296.
Full textAfifi Al-Atsari, Hilmi, and Imam Suharjo. "Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi." Jurnal Syntax Admiration 4, no. 11 (2023): 1977–96. http://dx.doi.org/10.46799/jsa.v4i11.757.
Full textGentile, Antonio Francesco, Peppino Fazio, and Giuseppe Miceli. "A Survey on the Implementation and Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and Mobile Scenarios." Telecom 2, no. 4 (2021): 430–45. http://dx.doi.org/10.3390/telecom2040025.
Full textZhu, Ling Li, and Qing Tan. "Research on Remote Fault Diagnosis System with Design of the Mine Enterprise Equipment Based on VPN." Advanced Materials Research 1046 (October 2014): 331–34. http://dx.doi.org/10.4028/www.scientific.net/amr.1046.331.
Full textZakaria, Mohd Idzaney, Mohd Natashah Norizan, Muammar Mohamad Isa, Mohd Faizal Jamlos, and Muslim Mustapa. "Comparative analysis on virtual private network in the internet of things gateways." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 488. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp488-497.
Full textZaenchkovski, Artur, and Alexey Lazarev. "Development of an intelligent decision-making system to support scientific and industrial formations VPN connections." E3S Web of Conferences 431 (2023): 05034. http://dx.doi.org/10.1051/e3sconf/202343105034.
Full textTyshyk, Ivan. "CHOICE OF REMOTE ACCESS TECHNOLOGY FOR EFFECTIVE ORGANIZATION OF PROTECTION OF NETWORK CONNECTIONS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 34–45. http://dx.doi.org/10.28925/2663-4023.2023.19.3445.
Full textMinaev, Osman M., and Kheda Y. Aliyeva. "THE ORGANIZATIONAL STRUCTURE OF THE TECHNICAL PROTECTION OF CORPORATE INFORMATION AT THE NETWORK LEVEL USING VPN TECHNOLOGY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 10/12, no. 151 (2024): 58–68. https://doi.org/10.36871/ek.up.p.r.2024.10.12.007.
Full textAnuntachai Machim, Murray John Lawn, and Ikuo Yamamoto. "Robotic Control by Teleoperation and Delay Time Issues Using the Internet." Proceedings of Engineering and Technology Innovation 14 (January 1, 2020): 01–08. http://dx.doi.org/10.46604/peti.2020.3931.
Full textHASANI, Anri, and Malvina NIKLEKAJ. "Security of VPNs in High-Surveillance Environments - A Comparative Study of VPN Alternatives." INGENIOUS 5, no. 1 (2025): 108–16. https://doi.org/10.58944/cwql3216.
Full textOnyshchuk, Oksana. "CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 294–303. https://doi.org/10.28925/2663-4023.2025.27.727.
Full textWang, Wei, and Chang Shi Li. "Software Implementation of Kompella-Based L2VPN." Applied Mechanics and Materials 511-512 (February 2014): 1230–34. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1230.
Full textReva, Ivan L., Igor A. Ognev, Alexandr A. Yakimenko, and Olga K. Alsova. "Technologies and methods for creating systems of secure information exchange." Digital technology security, no. 3 (September 29, 2022): 81–97. http://dx.doi.org/10.17212/2782-2230-2022-3-81-97.
Full textTalib, Hasanien Ali, Raya Basil Alothman, and Mazin S. Mohammed. "Malicious attacks modelling: a prevention approach for ad hoc network security." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 3 (2023): 1856. http://dx.doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.
Full textHasanien, Ali Talib, Basil Alothman Raya, and S. Mohammed Mazin. "Malicious attacks modelling: a prevention approach for ad hoc network security." Malicious attacks modelling: a prevention approach for ad hoc network security 30, no. 3 (2023): 1856–65. https://doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.
Full textDamanik, Hillman Akhyar. "Securing Data Network For Growing Business VPN architectures Cellular Network Connectivity." RSF Conference Series: Engineering and Technology 1, no. 2 (2021): 14–20. http://dx.doi.org/10.31098/cset.v1i2.470.
Full textDamanik, Hillman Akhyar. "SECURING DATA NETWORK FOR GROWING BUSINESS VPN ARCHITECTURES CELLULAR NETWORK CONNECTIVITY." Acta Informatica Malaysia 6, no. 1 (2022): 01–06. http://dx.doi.org/10.26480/aim.01.2022.01.06.
Full textTovar, Benjamin, Brian Bockelman, Michael Hildreth, Kevin Lannon, and Douglas Thain. "Harnessing HPC resources for CMS jobs using a Virtual Private Network." EPJ Web of Conferences 251 (2021): 02032. http://dx.doi.org/10.1051/epjconf/202125102032.
Full textMasroni, Masroni, Atit Pertiwi, and Amat Suroso. "MERANCANG DAN IMPLEMENTASI VPN PPTP UNTUK KONEKSI CLIENT SERVER APLIKASI KEUANGAN IFAS (Studi Kasus Pada Yayasan Teratai Putih Global)." Jurnal Informatika: Jurnal Pengembangan IT 6, no. 3 (2021): 168–74. http://dx.doi.org/10.30591/jpit.v6i3.2786.
Full textHafid, Afdhil, Harun Mukhtar, and Dani Harlian. "PENERAPAN FAILOVER NETWORK MENGGUNAKAN JARINGAN VPN DAN JARINGAN WIRELESS POINT-TO-POINT PADA DISTANCE BUILDING DI PT. TITIPAN KILAT RIAU." JTT (Jurnal Teknologi Terapan) 9, no. 1 (2023): 35. http://dx.doi.org/10.31884/jtt.v9i1.467.
Full textKozlovskis, Dāvis. "A COMPARATIVE STUDY OF THE SPEED AND SECURITY OF INTERNET BROWSERS: GOOGLE CHROME, MOZILLA FIREFOX, MICROSOFT EDGE, BRAVE AND OPERA." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 28 (September 10, 2024): 59–63. http://dx.doi.org/10.17770/het2024.28.8260.
Full textDr.Vipul, sharma, Shruti Singh Ms., and Lokesh Sharma Mr. "Evaluated Performance of Protocols." Journal of Optical Communication Electronics 4, no. 3 (2018): 1–4. https://doi.org/10.5281/zenodo.1465590.
Full textWu, Nancy, Anne-Sophie Brazeau, Meranda Nakhla, et al. "Type 1 Diabetes Mellitus Virtual Patient Network as a Peer Support Community: Protocol for Social Network Analysis and Content Analysis." JMIR Research Protocols 9, no. 8 (2020): e18714. http://dx.doi.org/10.2196/18714.
Full textArfind, Reza, Hendra Supendar, and Riza Fahlapi. "Perancangan Virtual Private Network Dengan Metode PPTP Menggunakan Mikrotik." Jurnal Komputer Antartika 1, no. 3 (2023): 108–16. https://doi.org/10.70052/jka.v1i3.28.
Full textHadood, Ashraf Khalifa M. "Implementation of Site to Site IPsec VPN Tunnel using GNS3 Simulation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 2302–7. https://doi.org/10.22214/ijraset.2024.65635.
Full textAhmad, Abdul Halim. "CHALLENGES AND EFFECTIVENESS OF USING CISCO PACKET TRACER SIMULATOR IN LEARNING VPN CONNECTION (VIRTUAL PRIVATE NETWORK)." International Journal of Modern Education 4, no. 14 (2022): 21–30. http://dx.doi.org/10.35631/ijmoe.414003.
Full textSimion, Georgian, Adrian Filipescu, Dan Ionescu, and Adriana Filipescu. "Cloud/VPN-Based Remote Control of a Modular Production System Assisted by a Mobile Cyber–Physical Robotic System—Digital Twin Approach." Sensors 25, no. 2 (2025): 591. https://doi.org/10.3390/s25020591.
Full textClaudia, Michelle, and Muhammad Rifqi. "Analisa Perbandingan Performansi Hot Standby Router Protocol (HSRP) dengan Gateway Load Balancing Protocol (GLBP) Pada Router Spoke DMVPN." JURNAL MEDIA INFORMATIKA BUDIDARMA 5, no. 2 (2021): 504. http://dx.doi.org/10.30865/mib.v5i2.2846.
Full textAffan, Usman Ibnu, Khairan Marzuki, and Lalu Zazuli Azhar Mardedi. "Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency." International Journal of Engineering and Computer Science Applications (IJECSA) 1, no. 2 (2022): 65–76. http://dx.doi.org/10.30812/ijecsa.v1i2.2379.
Full textHariyadi, I. Putu. "Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge Tunnel EoIP over SSTP." Jurnal Matrik 16, no. 2 (2017): 86. http://dx.doi.org/10.30812/matrik.v16i2.8.
Full textAgustyaningrum, Cucu Ika, Haryani Haryani, Choirunisa Iqbar Qurotaaini, Artika Surniandari, and Dedi Saputra. "Queue System Implementation at PT. Mulia Persada Indonesia Call Center Services." Paradigma - Jurnal Komputer dan Informatika 25, no. 2 (2023): 103–9. http://dx.doi.org/10.31294/p.v25i2.2310.
Full textLiu, Ziao, Yuanyuan Xie, Yanyan Luo, Yuxin Wang, and Xiangmin Ji. "TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification." Applied Sciences 15, no. 6 (2025): 2977. https://doi.org/10.3390/app15062977.
Full textFikri, Muhammad, and Muhammad Rifqi. "Implementasi VPN Antar Cabang Menggunakan Teknologi SDWAN dengan Metode Load Balance (Studi Kasus: PT. Mitra Solusi Infokom)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 1 (2023): 105–14. https://doi.org/10.25126/jtiik.2023105236.
Full textZhang, Rong Hua. "Management System of Computer Laboratory in Liberal College." Applied Mechanics and Materials 411-414 (September 2013): 712–15. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.712.
Full textKiriri, Peter N. "Service Delivery: The Perceptions of Users’ of Library Services in a Private University in Africa." European Journal of Multidisciplinary Studies 3, no. 4 (2018): 221. http://dx.doi.org/10.26417/275kuj79q.
Full textKist, Alexander, Ananda Maiti, Andrew Maxwell, et al. "Hosting and Sharing Your Own Remote Experiments with RALfie – an Open Ended Experiment Design Experience." International Journal of Online Engineering (iJOE) 12, no. 04 (2016): 40. http://dx.doi.org/10.3991/ijoe.v12i04.5101.
Full textPutra, Deva, and Melissa Indah Fianty. "Capability Level Measurement of Information Systems Using COBIT 5 Framework in Garment Company." Journal of Information Systems and Informatics 5, no. 1 (2023): 333–46. http://dx.doi.org/10.51519/journalisi.v5i1.454.
Full textPriyanka, Gowda Ashwath Narayana Gowda. "Importance of Cybersecurity in the Expansion of Remote Work." European Journal of Advances in Engineering and Technology 10, no. 2 (2023): 70–74. https://doi.org/10.5281/zenodo.13353661.
Full textTomi Defisa, Thomas Budiman, and Anton Zulkarnain Sianipar. "Model of Sharing Public IP Address Using Tunneling Protocol." Journal of Advances in Information and Industrial Technology 7, no. 1 (2025): 95–104. https://doi.org/10.52435/jaiit.v7i1.691.
Full text