Zeitschriftenartikel zum Thema „Virtual Private Network“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Virtual Private Network" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Kim, Kyung-Muk, und Hae-Sool Yang. „VPN (Virtual Private Network) SW's examination example analysis“. Journal of the Korea Academia-Industrial cooperation Society 11, Nr. 8 (31.08.2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.
Knapp, Laura. „Virtual Private Network Performance“. EDPACS 28, Nr. 7 (Januar 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.
Wright, Marie A. „Virtual Private Network Security“. Network Security 2000, Nr. 7 (Juli 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.
Scott, Charlie, Paul Wolfe und Mike Erwin. „Virtual Private Networks: Turning the Internet into Your Private Network“. EDPACS 27, Nr. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.
Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova und Bulbul Ongar. „USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS“. Series of Geology and Technical Sciences 447, Nr. 3 (15.06.2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
TAKEDA, T., R. MATSUZAKI, I. INOUE und S. URUSHIDANI. „Network Design Scheme for Virtual Private Network Services“. IEICE Transactions on Communications E89-B, Nr. 11 (01.11.2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.
Sobh, Tarek S., und Yasser Aly. „Effective and Extensive Virtual Private Network“. Journal of Information Security 02, Nr. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.
Crocetti, P., S. Fotedar, L. Fratta, G. Gallassi und M. Gerla. „ATM virtual private network design alternatives“. Computer Communications 18, Nr. 1 (Januar 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.
Su, Y., Y. Tian, E. Wong, N. Nadarajah und C. C. K. Chan. „All-optical virtual private network in passive optical networks“. Laser & Photonics Review 2, Nr. 6 (11.12.2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.
., Ekwe O. A. „VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY“. International Journal of Research in Engineering and Technology 03, Nr. 05 (25.05.2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.
Rana Abdul Kadhim Mahdi. „Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance“. Journal of Electrical Systems 20, Nr. 4s (01.04.2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.
Faizal, Faizal, und Andi Irmayana. „Sistem Persuratan Digital Berbasis Virtual Private Network“. DoubleClick: Journal of Computer and Information Technology 5, Nr. 1 (31.08.2021): 33. http://dx.doi.org/10.25273/doubleclick.v5i1.9121.
Chou, David C., David C. Yen und Amy Y. Chou. „Adopting virtual private network for electronic commerce“. Industrial Management & Data Systems 105, Nr. 2 (Februar 2005): 223–36. http://dx.doi.org/10.1108/02635570510583343.
Keng Lim, L., Jun Gao, T. S. Eugene Ng, Prashant R. Chandra, Peter Steenkiste und Hui Zhang. „Customizable virtual private network service with QoS“. Computer Networks 36, Nr. 2-3 (Juli 2001): 137–51. http://dx.doi.org/10.1016/s1389-1286(01)00173-6.
Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo und Martin Skutella. „New Approaches for Virtual Private Network Design“. SIAM Journal on Computing 37, Nr. 3 (Januar 2007): 706–21. http://dx.doi.org/10.1137/060654827.
Altın, A., E. Amaldi, P. Belotti und M. Ç. Pınar. „Virtual Private Network Design Under Traffic Uncertainty“. Electronic Notes in Discrete Mathematics 17 (Oktober 2004): 19–22. http://dx.doi.org/10.1016/j.endm.2004.03.007.
Kang, Sunyoung, Hyuncheol Kim und Seungae Kang. „Virtual private network for wellness sports information“. Multimedia Tools and Applications 74, Nr. 16 (24.06.2014): 6497–507. http://dx.doi.org/10.1007/s11042-014-2096-x.
Yu, Wei, und Jian Wang. „Scalable network resource management for large scale Virtual Private Networks“. Simulation Modelling Practice and Theory 12, Nr. 3-4 (Juli 2004): 263–85. http://dx.doi.org/10.1016/j.simpat.2004.02.002.
Khan, Yusera Farooq. „Cisco Secured Virtual Private Networks: A Review“. Asian Journal of Computer Science and Technology 7, Nr. 2 (05.08.2018): 30–33. http://dx.doi.org/10.51983/ajcst-2018.7.2.1886.
Lizarti, Nora, und Wirta Agustin. „Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)“. SATIN - Sains dan Teknologi Informasi 1, Nr. 1 (23.06.2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Marzuki, Khairan, Muhammad Idham Kholid, I. Putu Hariyadi und Lalu Zazuli Azhar Mardedi. „Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment“. International Journal of Electronics and Communications Systems 3, Nr. 1 (28.06.2023): 11. http://dx.doi.org/10.24042/ijecs.v3i1.16524.
Ekawati, Inna, und Dadan Irwan. „Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik“. JREC (Journal of Electrical and Electronics) 9, Nr. 1 (25.11.2021): 41–48. http://dx.doi.org/10.33558/jrec.v9i1.3110.
Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree und Dana Doghramachi. „Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol“. International Journal of Interactive Mobile Technologies (iJIM) 14, Nr. 18 (10.11.2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.
Sari, Yosi Nofita, Dedy Irfan und Asrul Huda. „Network Security Analysis Using Virtual Private Network in Vocational School“. Jurnal Paedagogy 9, Nr. 3 (21.07.2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.
Shi, Baohui. „Computer Network Information Security Protection Based on Virtual Private Network“. Journal of Physics: Conference Series 1646 (September 2020): 012121. http://dx.doi.org/10.1088/1742-6596/1646/1/012121.
Makhija, Deven. „5G Communication Systems: Network Slicing and Virtual Private Network Architecture“. ITM Web of Conferences 54 (2023): 02001. http://dx.doi.org/10.1051/itmconf/20235402001.
Timberg, Chris, Leah Liebovitz und Ben Miller. „The Private Virtual Network Operator Model for Field Area Network“. Climate and Energy 40, Nr. 6 (05.12.2023): 8–16. http://dx.doi.org/10.1002/gas.22381.
Qu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network“. Applied Mechanics and Materials 475-476 (Dezember 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.
Miller, Shane, Kevin Curran und Tom Lunney. „Detection of Virtual Private Network Traffic Using Machine Learning“. International Journal of Wireless Networks and Broadband Technologies 9, Nr. 2 (Juli 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.
Lota, Stanislaw, und Marcin Markowski. „Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment“. Journal of Applied Computer Science Methods 7, Nr. 2 (01.11.2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.
Dayana, D. S. „An Efficient Approach for Network Mobility Based on AES Algorithm“. Advanced Materials Research 984-985 (Juli 2014): 1269–75. http://dx.doi.org/10.4028/www.scientific.net/amr.984-985.1269.
Krile, Srecko, und Martin Medvecky. „Virtual Network Construction Technique, Treating All VPNs Simultaneously“. Elektronika ir Elektrotechnika 26, Nr. 2 (25.04.2020): 77–84. http://dx.doi.org/10.5755/j01.eie.26.2.22981.
Sobh, Tarek S., und Awad H. Khalil. „Securing Wargames System Using Effective Virtual Private Network“. Recent Patents on Computer Science 11, Nr. 4 (13.12.2018): 289–301. http://dx.doi.org/10.2174/2213275911666181002140451.
Iryani, Nanda, und Dyas Dendi Andika. „Implementasi Dynamic Multipoint Virtual Private Network Dual Hub“. Jurnal Telekomunikasi dan Komputer 11, Nr. 2 (20.08.2021): 118. http://dx.doi.org/10.22441/incomtech.v11i2.10839.
Ben-Yacoub, Leila Lamti. „On managing traffic over virtual private network links“. Journal of Communications and Networks 2, Nr. 2 (Juni 2000): 138–46. http://dx.doi.org/10.1109/jcn.2000.6596734.
Suryani, Erma, und Syamsu Nur Row Honey. „IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS“. JUTI: Jurnal Ilmiah Teknologi Informasi 6, Nr. 1 (01.01.2007): 31. http://dx.doi.org/10.12962/j24068535.v6i1.a185.
Cui, Wei, und Mostafa A. Bassiouni. „Virtual private network bandwidth management with traffic prediction“. Computer Networks 42, Nr. 6 (August 2003): 765–78. http://dx.doi.org/10.1016/s1389-1286(03)00217-2.
Wu, Jing, Michel Savoie, Scott Campbell, Hanxi Zhang und Bill Arnaud. „Layer 1 virtual private network management by users“. IEEE Communications Magazine 44, Nr. 12 (Dezember 2006): 86–93. http://dx.doi.org/10.1109/mcom.2006.273104.
Moradi, Ahmad, Andrea Lodi und S. Mehdi Hashemi. „On the difficulty of virtual private network instances“. Networks 63, Nr. 4 (07.03.2014): 327–33. http://dx.doi.org/10.1002/net.21548.
Bhat, Anjum Zameer, und Imran Ahmed. „A Simulation Environment for enhancing the student experience in advanced networking concepts“. SHS Web of Conferences 156 (2023): 07003. http://dx.doi.org/10.1051/shsconf/202315607003.
Álvarez, David, Pelayo Nuño, Carlos T. González, Francisco G. Bulnes, Juan C. Granda und Dan García-Carrillo. „Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks“. Sensors 23, Nr. 4 (04.02.2023): 1747. http://dx.doi.org/10.3390/s23041747.
Usanto, Usanto. „RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN“. JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, Nr. 2 (30.07.2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.
Roşu, Marius, und George Drăgoi. „VPN solutions and network monitoring to support virtual teams work in virtual enterprises“. Computer Science and Information Systems 8, Nr. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Nourildean, Shayma W. „Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers“. International Journal of Electrical and Electronic Engineering & Telecommunications 13, Nr. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.
Qu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System“. Applied Mechanics and Materials 321-324 (Juni 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.
Peng, Kai. „Construction and Exploration of Corporate Virtual Private Networks“. Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.
Yin, Chengrui. „Application of Virtual Private Network Technology in University Network Information Security“. Journal of Physics: Conference Series 1915, Nr. 4 (01.05.2021): 042071. http://dx.doi.org/10.1088/1742-6596/1915/4/042071.
Hidayatulloh, Syarif, und Wahyudin Wahyudin. „Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)“. Jurnal Teknik Komputer 5, Nr. 1 (06.02.2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.
Fajjari, Ilhem, Nadjib Aitsaadi, Boutheina Dab und Guy Pujolle. „Novel adaptive virtual network embedding algorithm for Cloud’s private backbone network“. Computer Communications 84 (Juni 2016): 12–24. http://dx.doi.org/10.1016/j.comcom.2016.03.019.
Zhang, Kun, Hai Feng Wang, Yu Chun Ma und Zhuang Li. „The Status and Development Trends of Virtual Private Network Technology“. Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.