Journal articles on the topic 'VPN management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'VPN management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.
Full textHudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.
Full textHidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (December 7, 2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Full textAlashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 20, 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.
Full textLi, Qiang, and Hua Long Liu. "RFID Network and its Application in Management of Aviation Maintenance." Applied Mechanics and Materials 475-476 (December 2013): 920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.920.
Full textSalman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textGaspoz, Jean-Paul, Jean-Pierre Hubaux, and Simon Znaty. "A generic architecture for VPN configuration management." Journal of Network and Systems Management 4, no. 4 (December 1996): 375–95. http://dx.doi.org/10.1007/bf02283161.
Full textPangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (June 9, 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.
Full textDamasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.
Full textZhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.
Full textLizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Full textHaeruddin, Haeruddin, Gautama Wijaya, and Husnul Khatimah. "Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut." JITU : Journal Informatic Technology And Communication 7, no. 2 (November 30, 2023): 102–13. http://dx.doi.org/10.36596/jitu.v7i2.1086.
Full textChu, Jie. "Designing and Implementation of High Concurrent SSL VPN Server." Applied Mechanics and Materials 241-244 (December 2012): 2424–29. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2424.
Full textS, Sujatha. "Detection of Virtual Private Networks Encrypted Traffic using Machine and Ensemble Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 5636–42. http://dx.doi.org/10.22214/ijraset.2024.61288.
Full textFathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (June 30, 2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.
Full textRahman, Fakhri Fakhlur, Sahari, and Riska Robianto. "Building Lptp Vpn Network and User Management Using Fuzzy Logic Based on Age and Utilization of The Dude for Network Monitoring." Jurnal KomtekInfo 7, no. 1 (January 14, 2020): 22–31. http://dx.doi.org/10.35134/komtekinfo.v7i1.62.
Full textZhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.
Full textAgrawal, Vani, Nilesh Dubey, Virendra Singh, Nepali Singla, Sarvesh Kumar, and Dinesh Goyal. "Authenticated key exchange protocol security of cloud services management using machine learning." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 5 (2023): 1381–91. http://dx.doi.org/10.47974/jdmsc-1761.
Full textChoi, Mi-Jung, and James Won-Ki Hong. "A secure web-based global management system for firewall/VPN devices." Journal of Communications and Networks 4, no. 1 (March 2002): 71–78. http://dx.doi.org/10.1109/jcn.2002.6596935.
Full textBahnasse, Ayoub, Mohamed Talea, Abdelmajid Badri, Fatima Ezzahraa Louhab, and Sara Laafar. "Smart hybrid SDN approach for MPLS VPN management on digital environment." Telecommunication Systems 73, no. 2 (August 6, 2019): 155–69. http://dx.doi.org/10.1007/s11235-019-00603-6.
Full textGengler, Barbara. "Check point outlines VPN strategy." Network Security 1999, no. 6 (June 1999): 6–7. http://dx.doi.org/10.1016/s1353-4858(99)90059-4.
Full textRowan, Tom. "VPN technology: IPSEC vs SSL." Network Security 2007, no. 12 (December 2007): 13–17. http://dx.doi.org/10.1016/s1353-4858(07)70104-6.
Full textScribbins, Alban, and Kevin Curran. "Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network." International Journal of Wireless Networks and Broadband Technologies 9, no. 1 (January 2020): 1–26. http://dx.doi.org/10.4018/ijwnbt.2020010101.
Full textNdichu, Samuel, Sylvester McOyowo, Henry Okoyo, and Cyrus Wekesa. "A Remote Access Security Model based on Vulnerability Management." International Journal of Information Technology and Computer Science 12, no. 5 (October 8, 2020): 38–51. http://dx.doi.org/10.5815/ijitcs.2020.05.03.
Full textNugroho, Fauyhi, and Ricki Herianto. "ANALISIS DAN PERANCANGAN WIDE AREA NETWORK (WAN) BERBASIS IP VPN PADA PT. AUTOCOMP SYSTEMS INDONESIA." Jurnal Dinamika UMT 7, no. 1 (March 16, 2022): 8. http://dx.doi.org/10.31000/dinamika.v7i1.6748.
Full textGold, Steve. "Pirate Bay develops anonymous VPN user protection." Infosecurity 6, no. 3 (April 2009): 8. http://dx.doi.org/10.1016/s1754-4548(09)70045-2.
Full textGaspoz, Jean-Paul, and Pierre-Alain Etique. "Applying an object-oriented method to design a VPN bandwidth management system." Annales Des Télécommunications 50, no. 7-8 (July 1995): 676–85. http://dx.doi.org/10.1007/bf02997872.
Full textZhang, Kai. "Research of Remote Access System to the Digital Resources Based on Cloud Computing." Applied Mechanics and Materials 543-547 (March 2014): 3606–9. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3606.
Full textPark, Jee-Tae, Chang-Yui Shin, Ui-Jun Baek, and Myung-Sup Kim. "Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification." Applied Sciences 14, no. 7 (April 5, 2024): 3073. http://dx.doi.org/10.3390/app14073073.
Full textГрибков, В. А. "Основные протоколы безопасности, используемые в VPN, и их роль в защите информации." ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ 102, no. 5 (2023): 17–19. http://dx.doi.org/10.18411/trnio-10-2023-241.
Full textFan, Ya Qin, Ge Zhang, Fei Fei Li, and Xin Zhang. "Design of SSL VPN System Based on RBAC Access." Advanced Materials Research 765-767 (September 2013): 1299–302. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1299.
Full textZhang, Rong Hua. "Management System of Computer Laboratory in Liberal College." Applied Mechanics and Materials 411-414 (September 2013): 712–15. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.712.
Full textBahnasse, Ayoub, Fatima Ezzahraa Louhab, Azeddine Khiat, Abdelmajid Badri, Mohamed Talea, and Bishwajeet Pandey. "Smart Hybrid SDN Approach for MPLS VPN Management and Adaptive Multipath Optimal Routing." Wireless Personal Communications 114, no. 2 (April 29, 2020): 1107–31. http://dx.doi.org/10.1007/s11277-020-07411-1.
Full textWu, Xiao Yong, Yu Hua Ni, Ying Kai Sun, and Hui He. "Framework of Virtual Private Supply Chain Management." Materials Science Forum 532-533 (December 2006): 1064–67. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.1064.
Full textSun, Weishi, Yaning Zhang, Jie Li, Chenxing Sun, and Shuzhuang Zhang. "A Deep Learning-Based Encrypted VPN Traffic Classification Method Using Packet Block Image." Electronics 12, no. 1 (December 27, 2022): 115. http://dx.doi.org/10.3390/electronics12010115.
Full textXiang, Hao, and Ming Li. "The Research of Network Security Mechanism Based Collaborative Design." Advanced Materials Research 421 (December 2011): 406–9. http://dx.doi.org/10.4028/www.scientific.net/amr.421.406.
Full textMuhammad Arifin, Fikri, Giva Andriana Mutiara, and Ismail Ismail. "Implementation of Management and Network Security Using Endian UTM Firewall." IJAIT (International Journal of Applied Information Technology) 1, no. 02 (August 14, 2017): 43–51. http://dx.doi.org/10.25124/ijait.v1i02.874.
Full textForbacha, Suh Charles, and Mbuya Josiah Anyam Agwu. "Design and Implementation of a Secure Virtual Private Network Over an Open Network (Internet)." American Journal of Technology 2, no. 1 (April 1, 2023): 1–36. http://dx.doi.org/10.58425/ajt.v2i1.134.
Full textDev, Kankan. "A Great Approach for Medium Size Hospital Network Infrastructure Architecture." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 1440–43. http://dx.doi.org/10.22214/ijraset.2021.38207.
Full textForte, Dario. "SSL VPN and return on investment: A possible combination." Network Security 2009, no. 10 (October 2009): 17–19. http://dx.doi.org/10.1016/s1353-4858(09)70112-6.
Full textRadchenko, V. D., A. Alekseenko, A. Rusnak, and S. I. Fomin. "Overcoming challenges in deep inspect of vpn and proxy by deep learning." Journal of Physics: Conference Series 2701, no. 1 (February 1, 2024): 012106. http://dx.doi.org/10.1088/1742-6596/2701/1/012106.
Full textLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence." Mathematical Problems in Engineering 2022 (August 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Full textVeronika Asri Tandirerung and Riana T. Mangesa. "Pengembangan E-learning Berbasis Edukati Pada Sekolah Menengah Atas." Information Technology Education Journal 1, no. 3 (September 8, 2022): 46–49. http://dx.doi.org/10.59562/intec.v1i3.252.
Full textJiang, Xiao Nuo, and Kai Leung Yung. "MMAP: An Intelligent Object Paradigm for the Monitoring and Control of Mobile-Enterprise." Materials Science Forum 532-533 (December 2006): 1168–71. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.1168.
Full textRoşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Full textYao, Wei Wei, Liang Gong, and Xia Xu. "Design and Implementation of Security Network Optimization." Advanced Materials Research 977 (June 2014): 507–10. http://dx.doi.org/10.4028/www.scientific.net/amr.977.507.
Full textSidik, Sidik, Ade Sudaryana, and Rame Santoso. "Implementasi Virtual Interface Menggunakan Metode EOIP Tunnel Pada Jaringan WAN PT. Indo Matra Lestari." Jurnal Teknik Komputer 6, no. 1 (January 10, 2020): 103–10. http://dx.doi.org/10.31294/jtk.v6i1.6830.
Full textCui, Jun, Longkun Bai, Guangxu Li, Zhigui Lin, and Penggao Zeng. "Semi-2DCAE: a semi-supervision 2D-CNN AutoEncoder model for feature representation and classification of encrypted traffic." PeerJ Computer Science 9 (November 9, 2023): e1635. http://dx.doi.org/10.7717/peerj-cs.1635.
Full textWu, Nancy, Anne-Sophie Brazeau, Meranda Nakhla, Deborah Chan, Deborah Da Costa, Geetha Mukerji, Sonia Butalia, et al. "Type 1 Diabetes Mellitus Virtual Patient Network as a Peer Support Community: Protocol for Social Network Analysis and Content Analysis." JMIR Research Protocols 9, no. 8 (August 31, 2020): e18714. http://dx.doi.org/10.2196/18714.
Full textChen, Yi Ping. "Enterprise Computer Network Security System Design & Realization." Applied Mechanics and Materials 543-547 (March 2014): 3195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3195.
Full text