Articoli di riviste sul tema "VPN"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "VPN".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Kazén, Miguel. "Problemessen vs. Spaßessen." Zeitschrift für Gesundheitspsychologie 14, no. 2 (April 2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.
Testo completoLeutner, Detlev, Anke Barthel, and Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment." Zeitschrift für Pädagogische Psychologie 15, no. 3/4 (November 2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.
Testo completoKempter, Guido, and Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale." Zeitschrift für Sozialpsychologie 31, no. 2 (June 2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.
Testo completoAnbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson, and Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment." Journal of General Virology 95, no. 2 (February 1, 2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.
Testo completoFatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Testo completoFu, Chunle, Bailing Wang, Wei Wang, Ruichao Mu, Yunxiao Sun, Guodong Xin, and Yongzheng Zhang. "A Generic High-Performance Architecture for VPN Gateways." Electronics 13, no. 11 (May 23, 2024): 2031. http://dx.doi.org/10.3390/electronics13112031.
Testo completoLee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi, and Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification." Journal of Korean Institute of Communications and Information Sciences 47, no. 11 (November 30, 2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.
Testo completoAndini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (October 9, 2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.
Testo completoKher, Bhushan, Preeti Karmore, Nutan Sonwane, Amol Gahane, Nitin Meshram, Kartik Ghagre, Himanshu Nandekar, and Sonal Borkar. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.
Testo completoMardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (December 1, 2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.
Testo completoJaafar, Fauziah Mohd, Houssam Attoui, Peter P. C. Mertens, Philippe de Micco, and Xavier de Lamballerie. "Structural organization of an encephalitic human isolate of Banna virus (genus Seadornavirus, family Reoviridae)." Journal of General Virology 86, no. 4 (April 1, 2005): 1147–57. http://dx.doi.org/10.1099/vir.0.80578-0.
Testo completoAnwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (June 2, 2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.
Testo completoLiu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.
Testo completoFu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (July 8, 2024): 2674. http://dx.doi.org/10.3390/electronics13132674.
Testo completoKennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (October 1, 2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.
Testo completoMohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur, and Iman Hazwam Abd Halim. "SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.
Testo completoKempter, Guido. "Scriptanimation. Methode zur Beschreibung und Darstellung natürlicher menschlicher Bewegungen." Experimental Psychology 46, no. 2 (April 1999): 129–34. http://dx.doi.org/10.1026//0949-3964.46.2.129.
Testo completoHyatt, A. D. "Exposure of protein VP7 on the surface of bluetongue virus." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 3 (August 12, 1990): 600–601. http://dx.doi.org/10.1017/s0424820100160558.
Testo completoZhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (May 2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.
Testo completoZelenkina, A. S., E. A. Pavlyukevich, and A. V. Ponachugin. "VPN: USE, SECURITY, RISKS." ITNOU: Information technologies in science, education and management 1, no. 19 (December 2022): 45–48. http://dx.doi.org/10.47501/itnou.2022.1.45-48.
Testo completoFan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.
Testo completoHuman Sukma, Ayman, Mhd Ilyasyah Drilanang, Sybil Auzi, and Dedy Kiswanto. "IMPLEMENTASI OPENVPN SERVER MENGGUNAKAN RED HAT ENTERPRISE LINUX PADA AMAZON WEB SERVICES." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 6 (November 18, 2024): 12601–7. https://doi.org/10.36040/jati.v8i6.12010.
Testo completoMahardiyanto, Muliatama Putra. "Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, no. 2 (November 7, 2016): 26–32. http://dx.doi.org/10.33795/jartel.v3i2.217.
Testo completoRahman, Taufik, Giovanni Maria Vianney Tobia Mariatmojo, Hafis Nurdin, and Herman Kuswanto. "Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi." Teknika 11, no. 2 (July 1, 2022): 138–47. http://dx.doi.org/10.34148/teknika.v11i2.482.
Testo completoChen, Jianyun, and Chunyan Li. "Research on meteorological information network security system based on VPN Technology." MATEC Web of Conferences 232 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201823201001.
Testo completoFan, Ya Qin, Hao Fan, and Chao Sun. "OPNET-Based Computer Simulation of MPLS VPN Security Solutions." Applied Mechanics and Materials 40-41 (November 2010): 361–65. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.361.
Testo completoHaeruddin, Haeruddin, and Kelvin Kelvin. "Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19." Jurnal Ilmu Komputer dan Bisnis 13, no. 1 (May 1, 2022): 105–14. http://dx.doi.org/10.47927/jikb.v13i1.279.
Testo completoYessenzholov, Ulan, and Nurbol Kaliaskarov. "IMPLEMENTATION OF TRAFFIC PROTECTION BASED ON IPSEC VPN TECHNOLOGY AND NETWORK MODELING ON ENSP SOFTWARE ENVIRONMENT." Вестник КазАТК 126, no. 3 (June 19, 2023): 198–204. http://dx.doi.org/10.52167/1609-1817-2023-126-3-198-204.
Testo completoDomakonda, Dileep. "Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN." Eastasouth Journal of Information System and Computer Science 1, no. 02 (December 30, 2023): 126–31. https://doi.org/10.58812/esiscs.v1i02.513.
Testo completoFan, Ya Qin, Sheng Sheng Qian, and Feng Shan Liang. "VPN Security Technology Theory Modeling and Simulation." Applied Mechanics and Materials 135-136 (October 2011): 1114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1114.
Testo completoAriyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (June 15, 2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.
Testo completoSupriyanto, Bambang, and Suharyanto Suharyanto. "Perancangan Jaringan VPN Menggunakan Metode Point To Point Tunneling Protocol." Jurnal Teknik Komputer 5, no. 2 (August 1, 2019): 235–40. http://dx.doi.org/10.31294/jtk.v5i2.5452.
Testo completoMohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study." Al-Nahrain Journal for Engineering Sciences 22, no. 4 (December 20, 2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.
Testo completoJuliansah, Jodi, and Yuma Akbar. "OPTIMALISASI KINERJA JARINGAN VPN DENGAN METODE DMVPN." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 3 (September 10, 2023): 1788–98. http://dx.doi.org/10.35870/jimik.v4i3.412.
Testo completoNovanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (March 12, 2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.
Testo completoRendy, Munadi, Dwi Sanjoyo Danu, Perdana Doan, and Adjie Fidar. "Performance analysis of tunnel broker through open virtual private network." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (June 1, 2019): 1185–92. https://doi.org/10.12928/TELKOMNIKA.v17i3.12231.
Testo completoSulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.
Testo completoShepherd, Frances, Diana Herrera-Ibata, Elizabeth Porter, Nitipong Homwong, Richard Hesse, Jianfa Bai, and Douglas Marthaler. "Whole Genome Classification and Phylogenetic Analyses of Rotavirus B strains from the United States." Pathogens 7, no. 2 (April 18, 2018): 44. http://dx.doi.org/10.3390/pathogens7020044.
Testo completoDamasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.
Testo completoE, Poerbaningtyas, and Achmad Riyan Adi. "Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo." J-INTECH 12, no. 02 (December 19, 2024): 340–52. https://doi.org/10.32664/j-intech.v12i02.1468.
Testo completoQian, Xuan Yu, Shi Min Liu, Cheng Zhou, and Xiao Juan Guan. "Research of Network Testing Based on MPLS L2VPN." Advanced Materials Research 791-793 (September 2013): 1695–98. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1695.
Testo completoKuang, Ai Nong. "Application Research of Computer Network Load Certification Constructing VPN Tunnel Technology." Advanced Materials Research 926-930 (May 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2217.
Testo completoRifandy, Ahmad Surya, and Salman Topiq. "Analisa dan Implementasi VPN Dinamis Menggunakan Hamachi Pada PT. Jaindo Metal Industries." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 6, no. 2 (April 30, 2023): 178–86. http://dx.doi.org/10.32672/jnkti.v6i2.5904.
Testo completoKhan, Muhammad U. S., Syed M. A. H. Bukhari, Tahir Maqsood, Muhammad A. B. Fayyaz, Darren Dancey, and Raheel Nawaz. "SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic." Electronics 11, no. 3 (January 24, 2022): 350. http://dx.doi.org/10.3390/electronics11030350.
Testo completoHaeruddin, Haeruddin, Gautama Wijaya, and Husnul Khatimah. "Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut." JITU : Journal Informatic Technology And Communication 7, no. 2 (November 30, 2023): 102–13. http://dx.doi.org/10.36596/jitu.v7i2.1086.
Testo completoPangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (June 9, 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.
Testo completoSun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.
Testo completoPangestu, Raka Nugraha, Risma Yanti, and Herlina Harahap. "Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (June 19, 2021): 27–33. http://dx.doi.org/10.35447/jikstra.v3i1.357.
Testo completoPatel, Raj Kumar, and Dr Lalan Kumar Singh. "Cloud Based VPN Using IP Tunneling for Remote Site Interface." International Journal for Research in Applied Science and Engineering Technology 11, no. 2 (February 28, 2023): 1565–70. http://dx.doi.org/10.22214/ijraset.2023.48722.
Testo completoAlqahtany, Saad Said, and Toqeer Ali Syed. "Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework." Applied Sciences 14, no. 11 (May 23, 2024): 4421. http://dx.doi.org/10.3390/app14114421.
Testo completo