Journal articles on the topic 'Internet (computer network)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet (computer network).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Full textSakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.
Full textNemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textM.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.
Full textDasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.
Full textAndhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.
Full textGoffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.
Full textBorisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.
Full textSanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (January 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.
Full textNoviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.
Full textAfrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (September 9, 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.
Full textKeller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.
Full textChen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.
Full textZhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.
Full textArmanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau." Jurnal Ilmiah Betrik 10, no. 03 (November 14, 2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.
Full textHart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.
Full textSubhi, Doaa, and Laszlo Bacsardi. "Using Quantum Nodes Connected via the Quantum Cloud to Perform IoT Quantum Network." Condensed Matter 8, no. 1 (February 23, 2023): 24. http://dx.doi.org/10.3390/condmat8010024.
Full textZhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.
Full textCarius, Ana Carolina, Claro Ribeiro Pires, Vanessa Moreira Wendling, and Eduardo Campos Papa. "Resilience in computer networks and personal well-being: Computer engineering at the service of digital life." Conjecturas 21, no. 5 (November 18, 2021): 705–16. http://dx.doi.org/10.53660/conj-317-515.
Full textOdhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (December 4, 2012): 302–9. http://dx.doi.org/10.48084/etasr.145.
Full textWan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.
Full textYuliana, Dela, and I. Komang Ari Mogi. "Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 2 (November 24, 2020): 235. http://dx.doi.org/10.24843/jlk.2020.v09.i02.p10.
Full textHusna, Muhammad Aliyul, and Perani Rosyani. "Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (December 30, 2021): 247. http://dx.doi.org/10.30865/jurikom.v8i6.3631.
Full textRaharjo, Mugi, Frengki Pernando, and Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)." Jurnal Teknik Komputer 5, no. 1 (February 11, 2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.
Full textUpadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.
Full textWang, Zhi Kun. "Application of Complex Network Theory in Computer Network Topology Optimization Research." Advanced Materials Research 989-994 (July 2014): 4237–40. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4237.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textSaputro, Bagus Aji. "Network Security Analysis and Bandwidth Management." International Journal of Science, Engineering and Information Technology 5, no. 02 (July 27, 2021): 260–65. http://dx.doi.org/10.21107/ijseit.v5i02.6481.
Full textTedyyana, Agus, and Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway." INOVTEK Polbeng - Seri Informatika 3, no. 1 (June 3, 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.
Full textBabosov, Ye М. "Contradictory use of computer technology in a modern network society." Proceedings of the National Academy of Sciences of Belarus, Humanitarian Series 64, no. 3 (August 16, 2019): 289–98. http://dx.doi.org/10.29235/2524-2369-2019-64-3-289-298.
Full textButler, Declan. "Experts fear network paralysis as computer worms blast Internet." Nature 425, no. 6953 (September 2003): 3. http://dx.doi.org/10.1038/425003a.
Full textSheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.
Full textQian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.
Full textPuzmanová, Rita. "Simple Internet network management text." Computer Communications 16, no. 4 (April 1993): 262. http://dx.doi.org/10.1016/0140-3664(93)90097-c.
Full textGanapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera." American Journal of Trade and Policy 6, no. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.
Full textWei, Li, and Da Zhi Deng. "A Novel Stable Algorithm of Getting User’s Account Based on Telnet Protocol." Applied Mechanics and Materials 299 (February 2013): 130–34. http://dx.doi.org/10.4028/www.scientific.net/amm.299.130.
Full textVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textLiu, Yang, Jie Jiang, Jiahao Sun, and Xianghan Wang. "InterNet+: A Light Network for Hand Pose Estimation." Sensors 21, no. 20 (October 11, 2021): 6747. http://dx.doi.org/10.3390/s21206747.
Full textAgarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha, and Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things." International Journal of Grid and High Performance Computing 11, no. 3 (July 2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.
Full textDzhuliy, V. M., O. V. Miroshnichenko, and L. V. Solodeeva. "METHOD OF CLASSIFICATION OF APPLICATIONS TRAFFIC OF COMPUTER NETWORKS ON THE BASIS OF MACHINE LEARNING UNDER UNCERTAINTY." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 74 (2022): 73–82. http://dx.doi.org/10.17721/2519-481x/2022/74-07.
Full textSaleh, Khairul, and Tini Fitriani. "ANALISA SISTEM INFORMASI KEAMANAN INTERNET SPEEDY PADA PLASA TELKOM TANJUNGBALAI." JURNAL TEKNOLOGI INFORMASI 1, no. 2 (September 7, 2018): 137. http://dx.doi.org/10.36294/jurti.v1i2.302.
Full textAlakbarov, Rashid. "AZSCIENCENET SCIENCE-COMPUTER NETWORK: STAGES OF DEVELOPMENT, INTERNET SERVICES AND PROSPECTS." Problems of Information Society 07, no. 1 (January 21, 2016): 11–20. http://dx.doi.org/10.25045/jpis.v07.i1.02.
Full textQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Full textCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Full textAbbate, Janet. "Government, Business, and the Making of the Internet." Business History Review 75, no. 1 (2001): 147–76. http://dx.doi.org/10.2307/3116559.
Full textKhasambiev, I. V., and E. A. Guseva. "Network architectures and protocols of M2M communications." Journal of Physics: Conference Series 2176, no. 1 (June 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2176/1/012019.
Full textLazarov, Andon D., and Petia Petrova. "Modelling Activity of a Malicious User in Computer Networks." Cybernetics and Information Technologies 22, no. 2 (June 1, 2022): 86–95. http://dx.doi.org/10.2478/cait-2022-0018.
Full textHerlina, Elvi. "Bandwidth Management Design Analysis for Computer Network Infrastructure at SMKN 1 Abdya." Jurnal Manajemen Informatika Medicom (JMI) 10, no. 2 (September 30, 2022): 21–25. http://dx.doi.org/10.35335/jmi.v10i2.4.
Full textZhao, Ying. "Local Area Network Information Security and Virus Countermeasures of the Internet." Advanced Materials Research 1079-1080 (December 2014): 598–600. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.598.
Full text