Journal articles on the topic 'Intranets (Computer networks)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Intranets (Computer networks).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Regli, W. "Intranets." IEEE Internet Computing 1, no. 5 (September 1997): 6–7. http://dx.doi.org/10.1109/mic.1997.623962.
Full textSafiyanu, Adam Musa, Ogah Muhammad Usman, and Yakubu Awal Jibrin. "Exploring the Landscape of Computer Networking: An In-Depth Survey." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (September 30, 2023): 187–92. http://dx.doi.org/10.22214/ijraset.2023.55599.
Full textLichtenstein, Sharman, Craig M. Parker, and Alexia Hunter. "Dynamic Knowledge Integration in Socio-Technical Networks: An Interpretive Study of Intranet Use for Knowledge Integration." Journal of Information & Knowledge Management 06, no. 02 (June 2007): 91–103. http://dx.doi.org/10.1142/s021964920700172x.
Full textChellappa, Ramnath K., and Alok Gupta. "Managing computing resources in active intranets." International Journal of Network Management 12, no. 2 (2002): 117–28. http://dx.doi.org/10.1002/nem.427.
Full textMcCracken, D. "Review: Intranets: The Surf Within." Computer Bulletin 40, no. 1 (January 1, 1998): 31. http://dx.doi.org/10.1093/combul/40.1.31-a.
Full textAshley, P., M. Vandenwauver, and F. Siebenlist. "Applying authorization to intranets: architectures, issues and APIs." Computer Communications 23, no. 17 (November 2000): 1613–20. http://dx.doi.org/10.1016/s0140-3664(00)00247-4.
Full textPhaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets." EDPACS 27, no. 12 (June 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.
Full textDixit, Keerti. "Identification of Network Vulnerabilities through IISRA Framework." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 4426–38. http://dx.doi.org/10.22214/ijraset.2023.52554.
Full textElmorshidy, Ahmed. "Determinates of Live Support Chat in Organizational Intranets." Journal of Electronic Commerce in Organizations 17, no. 3 (July 2019): 16–34. http://dx.doi.org/10.4018/jeco.2019070102.
Full textWilson, Tom. "Mastering intranets: The windows 95/NT edition." International Journal of Information Management 17, no. 6 (December 1997): 469–70. http://dx.doi.org/10.1016/s0268-4012(97)84382-4.
Full textLamb, Roberta, and Elizabeth Davidson. "Understanding intranets in the context of end-user computing." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 64–85. http://dx.doi.org/10.1145/1047070.1047076.
Full textVukatana, Kreshnik, Elira Hoxha, and Kozeta Sevrani. "Knowledge Transfer through Computer-based Systems in Manufacturing Networks: A Study on Albanian Plants." Academic Journal of Interdisciplinary Studies 11, no. 1 (January 3, 2022): 180. http://dx.doi.org/10.36941/ajis-2022-0016.
Full textMahmood, Shahid, Moneeb Gohar, Jin-Ghoo Choi, Seok-Joo Koh, Hani Alquhayz, and Murad Khan. "Digital Certificate Verification Scheme for Smart Grid using Fog Computing (FONICA)." Sustainability 13, no. 5 (February 26, 2021): 2549. http://dx.doi.org/10.3390/su13052549.
Full textSinickas, Angela D. "The Role of Intranets and Other E-Channels in Employee Communication Preferences." Journal of Website Promotion 1, no. 1 (April 18, 2005): 31–51. http://dx.doi.org/10.1300/j238v01n01_04.
Full textEt. al., Tarun Dhar Diwan,. "AN INVESTIGATION AND ANALYSIS OF CYBER SECURITY INFORMATION SYSTEMS: LATEST TRENDS AND FUTURE SUGGESTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 25, 2021): 477–92. http://dx.doi.org/10.17762/itii.v9i2.372.
Full textSun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.
Full textZhou, Xujuan, Raj Gururajan, Yuefeng Li, Revathi Venkataraman, Xiaohui Tao, Ghazal Bargshady, Prabal D. Barua, and Srinivas Kondalsamy-Chennakesavan. "A survey on text classification and its applications." Web Intelligence 18, no. 3 (September 30, 2020): 205–16. http://dx.doi.org/10.3233/web-200442.
Full textGunawan, Arief. "LAYANAN PENELUSURAN KOLEKSI PERPUSTAKAAN MELALUI JARINGAN INTRANET DI PUSAT RISET PERIKANAN." Jurnal Pari 5, no. 2 (February 26, 2020): 105. http://dx.doi.org/10.15578/jp.v5i2.8773.
Full textWang, Rongxia, Zhifang Liu, Shufeng Yang, and Jianxing Wang. "Implementation of Driving Safety Early Warning System Based on Trajectory Prediction on the Internet of Vehicles Environment." Security and Communication Networks 2022 (May 19, 2022): 1–6. http://dx.doi.org/10.1155/2022/2922507.
Full textCase, Gary N., Mladen A. Vouk, and John M. Mackenzie. "Real-Time Full Motion Stereo Microscopy Over Internet." Microscopy and Microanalysis 5, S2 (August 1999): 368–69. http://dx.doi.org/10.1017/s1431927600015166.
Full textRodianto and Ahmad Juliansyah. "ANALISIS DAN PERANCANGAN JARINGAN KOMPUTER UNTUK IMPLEMENTASI SISTEM INFORMASI PADA WINDOWS SERVER 2016 MENGGUNAKAN INTERNET DAN INTRANET DI UNIVERSITAS TEKNOLOGI SUMBAWA." Jurnal Informatika, Teknologi dan Sains 1, no. 2 (November 29, 2019): 104–10. http://dx.doi.org/10.51401/jinteks.v1i2.415.
Full textJapriadi, Yohanes Setiawan, and Lukas Tommy. "PROTOTIPE APLIKASI UJIAN CODING PHP BERBASIS WEB INTRANET DI STMIK ATMA LUHUR." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (July 27, 2019): 73–80. http://dx.doi.org/10.33480/jitk.v5i1.681.
Full textZhang, Xiao. "Intranet Web System, a Simple Solution to Companywide Information-on-demand." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 404–5. http://dx.doi.org/10.1017/s0424820100164489.
Full textXian Zhang, Xian Zhang, Pengju Tang Xian Zhang, Dong Yin Pengju Tang, Taiguo Qu Dong Yin, and Yiwen Liu Taiguo Qu. "The Network Model of Internet Access Intranet Based on Embedded Platform." 網際網路技術學刊 23, no. 2 (March 2022): 201–8. http://dx.doi.org/10.53106/160792642022032302001.
Full textAhmed Ali, Adel, and Ahmed M. Al-Naamany. "Converged Networking: A Review of Concepts and Technologies." Sultan Qaboos University Journal for Science [SQUJS] 5 (December 1, 2000): 209. http://dx.doi.org/10.24200/squjs.vol5iss0pp209-225.
Full textRosid, Usep Abdul. "Penerapan Aplikasi Web Upload Download menggunakan PHP pada Laboratorium Komputer LP3I Tasikmalaya." Jurnal Sistem Informasi Galuh 1, no. 1 (January 11, 2023): 8–14. http://dx.doi.org/10.25157/jsig.v1i1.2916.
Full textRetnowati, Nurcahyani Dewi, and Mahmuda Ghazni Rahmawan. "ANIMASI E-LEARNING PEMBELAJARAN MATEMATIKA DAN FISIKA BAGI SISWA SEKOLAH MENENGAH PERTAMA KELAS 1." Angkasa: Jurnal Ilmiah Bidang Teknologi 8, no. 2 (August 25, 2017): 139. http://dx.doi.org/10.28989/angkasa.v8i2.127.
Full textLiharja, Yosua, Ani Oktarini Sari, and Arief Satriansyah. "Rancang Bangun Sistem Informasi Helpdesk IT Support Berbasis Website." Infotek : Jurnal Informatika dan Teknologi 5, no. 1 (January 31, 2022): 157–66. http://dx.doi.org/10.29408/jit.v5i1.4738.
Full textHu, Teng, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, and Yuan Liu. "An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning." Security and Communication Networks 2019 (February 17, 2019): 1–12. http://dx.doi.org/10.1155/2019/3898951.
Full textSiegel, Carolyn F. "Using Computer Networks (Intranet and Internet) to Enhance Your Students' Marketing Skills." Journal of Marketing Education 18, no. 3 (December 1996): 14–24. http://dx.doi.org/10.1177/027347539601800303.
Full textRoşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Full textAr Ruhimat, Qurrota A'yuni, Slamin Slamin, and Alvira Malinda. "Efektivitas Algoritma Kruskal dalam Mengoptimalkan Jalur Terpendek pada Jaringan Intranet." JSN : Jurnal Sains Natural 2, no. 3 (June 24, 2024): 59–67. http://dx.doi.org/10.35746/jsn.v2i3.546.
Full textYenke, B. O., J. Mehaut, and M. Tchuente. "Scheduling of Computing Services on Intranet Networks." IEEE Transactions on Services Computing 4, no. 3 (July 2011): 207–15. http://dx.doi.org/10.1109/tsc.2011.28.
Full textMarchevsky, Alberto M., Ronda Dulbandzhyan, Kevin Seely, Steve Carey, and Raymond G. Duncan. "Storage and Distribution of Pathology Digital Images Using Integrated Web-Based Viewing Systems." Archives of Pathology & Laboratory Medicine 126, no. 5 (May 1, 2002): 533–39. http://dx.doi.org/10.5858/2002-126-0533-sadopd.
Full textChen, Yu Ke, Yu Long Ma, and Yang Bai. "The Real-Time Transmission System of Computer Screen Based on Intranet." Advanced Materials Research 718-720 (July 2013): 2409–12. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.2409.
Full textLesjak, Martin. "Automatic early warning systems for the environment." Nuclear Technology and Radiation Protection 18, no. 2 (2003): 44–50. http://dx.doi.org/10.2298/ntrp0302044l.
Full textRiki, Riki, Aditiya Hermawan, and Yusuf Kurnia. "Voice Over Internet Protocol Based Communication Design (VoIP) With 3CXSystemPhone On Android Smartphone." bit-Tech 1, no. 1 (August 30, 2018): 1–8. http://dx.doi.org/10.32877/bt.v1i1.2.
Full textWilliamson, J. "Review: Intranet Security." Computer Bulletin 40, no. 3 (May 1, 1998): 32. http://dx.doi.org/10.1093/combul/40.3.32-b.
Full textYuhanna, Ivan, Arzuni Alexander, and Agemian Kachik. "Advantages and disadvantages of Online Learning." Journal Educational Verkenning 1, no. 2 (December 24, 2020): 13–19. http://dx.doi.org/10.48173/jev.v1i2.54.
Full textOppliger, Rolf, and Artech House. "Internet And Intranet Security." EDPACS 27, no. 9 (March 2000): 1. http://dx.doi.org/10.1201/1079/43255.27.9.20000301/30320.6.
Full textFachrurrozi, Nurwan Reza, Andri Agustav Wirabudi, and Seandy Arandiant Rozano. "Design of network monitoring system based on LibreNMS using Line Notify, Telegram, and Email notification." SINERGI 27, no. 1 (January 18, 2023): 111. http://dx.doi.org/10.22441/sinergi.2023.1.013.
Full textHooda, Madhurima, Amandeep Kaur, and Madhulika Bhadauria. "Recent innovations in Distributed Systems: Challenges and Benefits." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 10 (September 25, 2013): 2057–61. http://dx.doi.org/10.24297/ijct.v10i10.1194.
Full textSen, Angshu Maan, and K. Anand Kumar Singha. "Mitigating the Distributed Denial of Service (DDoS) Attacks in Campus Local Area Network(CLAN)." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 6 (August 25, 2013): 1706–14. http://dx.doi.org/10.24297/ijct.v10i6.7010.
Full textGE, MING, and YANGSHENG XU. "KERNEL-BASED DATA COMPRESSION FOR ADVANCED MANUFACTURING SYSTEM." Journal of Advanced Manufacturing Systems 02, no. 01 (June 2003): 89–104. http://dx.doi.org/10.1142/s021968670300023x.
Full textXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang, and Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Full textAnitha, K., Tejus Khadri, Tejas Purvimath S, Venkatesh TD, and Yash Nesarikar. "Wide Area Disaster Management System Using Mobile Intranet." International Journal of Engineering and Advanced Technology 8, no. 5s (June 29, 2019): 80–83. http://dx.doi.org/10.35940/ijeat.e1017.0585s19.
Full textKhasnabish, B., and R. Saracco. "Intranet Services and communication Management." IEEE Communications Magazine 35, no. 10 (October 1997): 78–83. http://dx.doi.org/10.1109/mcom.1997.623990.
Full textJiao Guo, Hang Wei, Donghui Liu, Qinqun Chen, Yuan Zheng, Hongmin Cai, and Hao Chen. "Bypass Network Security Detection Model for Virtual Machine Intranet." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 3 (February 15, 2013): 116–23. http://dx.doi.org/10.4156/aiss.vol5.issue3.15.
Full textCline, Gregory P. "Web servers and the rise of the corporate ‘intranet’." International Journal of Network Management 5, no. 6 (November 1995): 322–25. http://dx.doi.org/10.1002/nem.4560050608.
Full textMuharam, Rahman, and Feri Sulianta. "Sistem Informasi Helpdesk It Perum Peruri." Syntax Idea 5, no. 2 (February 23, 2023): 211. http://dx.doi.org/10.46799/syntax-idea.v5i2.2107.
Full text