Journal articles on the topic 'Virtual private network servers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Virtual private network servers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study." Al-Nahrain Journal for Engineering Sciences 22, no. 4 (December 20, 2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.
Full textRoşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Full textHariyadi, I. Putu, and Akbar Juliansyah. "Analisa Penerapan Private Cloud Computing Berbasis Proxmox Virtual Environment Sebagai Media Pembelajaran Praktikum Manajemen Jaringan." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 1 (November 29, 2018): 1–12. http://dx.doi.org/10.30812/matrik.v18i1.329.
Full textKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Full textSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee, and Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT." Applied Sciences 11, no. 18 (September 20, 2021): 8757. http://dx.doi.org/10.3390/app11188757.
Full textQu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System." Applied Mechanics and Materials 321-324 (June 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.
Full textSano, Albert Verasius Dian. "Simulasi Saham Berbasis Web dengan Teknologi Virtual Private Network di Portal Www.Kontan.Co.Id." ComTech: Computer, Mathematics and Engineering Applications 2, no. 2 (December 1, 2011): 946. http://dx.doi.org/10.21512/comtech.v2i2.2845.
Full textQu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network." Applied Mechanics and Materials 475-476 (December 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.
Full textLizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (December 11, 2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full textLota, Stanislaw, and Marcin Markowski. "Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment." Journal of Applied Computer Science Methods 7, no. 2 (November 1, 2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.
Full textHidayatulloh, Syarif, and Wahyudin Wahyudin. "Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)." Jurnal Teknik Komputer 5, no. 1 (February 6, 2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.
Full textHariyadi, I. Putu, and Khairan Marzuki. "Implementation Of Configuration Management Virtual Private Server Using Ansible." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 19, no. 2 (May 30, 2020): 347–57. http://dx.doi.org/10.30812/matrik.v19i2.724.
Full textTovar, Benjamin, Brian Bockelman, Michael Hildreth, Kevin Lannon, and Douglas Thain. "Harnessing HPC resources for CMS jobs using a Virtual Private Network." EPJ Web of Conferences 251 (2021): 02032. http://dx.doi.org/10.1051/epjconf/202125102032.
Full textTrihadi, Siswa, Frenky Budianto, and Wirriyanto Arifin. "PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI." CommIT (Communication and Information Technology) Journal 2, no. 1 (May 31, 2008): 25. http://dx.doi.org/10.21512/commit.v2i1.488.
Full textSatwika, I. Kadek Susila. "ANALISIS QUALITY OF SERVICE JARINGAN VIRTUAL PRIVATE NETWORK (VPN) DI STMIK STIKOM INDONESIA." JURNAL ILMIAH INFORMATIKA 7, no. 01 (March 22, 2019): 60. http://dx.doi.org/10.33884/jif.v7i01.1016.
Full textWijaya, Tony. "PENERAPAN METODE SCRUM DAN VIRTUAL PRIVATE NETWORK DALAM PERANCANGAN SISTEM ORDERSALES." CCIT Journal 11, no. 1 (February 20, 2018): 115–25. http://dx.doi.org/10.33050/ccit.v11i1.565.
Full textOctavia, Hadria. "UNJUK KERJA PENERAPAN TEKNOLOGI VoIP PADA JARINGAN VPN (VIRTUAL PRIVATE NETWORK)." Elektron : Jurnal Ilmiah 5, no. 2 (August 26, 2018): 1–12. http://dx.doi.org/10.30630/eji.5.2.49.
Full textKaur, Gagandeep, Dr Mohita Garg, and Mrs Navjot Jyoti. "ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 24, 2015): 5840–44. http://dx.doi.org/10.24297/ijct.v14i6.1910.
Full textKaur, Randeep, and Jagroop Kaur. "Enhancing Cloud Computing Security by Using Pixel Key Pattern." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (May 16, 2015): 5919–28. http://dx.doi.org/10.24297/ijct.v14i7.1894.
Full textKaur, Amandeep, and Mr Pawan Luthra. "ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING USING HYBRID ENCRYPTION ALGORITHM AND FRAGMENTATION: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (June 2, 2015): 5987–93. http://dx.doi.org/10.24297/ijct.v14i8.1859.
Full textAriyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (June 15, 2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.
Full textSudiana, Sudiana, Kusrini Kusrini, and Andi Sunyoto. "DESAIN SISTEM MANAJEMEN SERVER DATABASE SECARA REMOTE CONTROL BERBASIS VPN (VIRTUAL PRIVATE NETWORK)." KURVATEK 3, no. 1 (May 6, 2018): 119–31. http://dx.doi.org/10.33579/krvtk.v3i1.752.
Full textMa, Xiaobo, Jian Qu, Feitong Chen, Wenmao Liu, Jianfeng Li, Jing Tao, Hongshan Jiao, Mawei Shi, and Zhi-Li Zhang. "One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers." IEEE Communications Magazine 59, no. 2 (February 2021): 64–69. http://dx.doi.org/10.1109/mcom.001.2000602.
Full textMukmin, Chairul, and Widya Cholil. "PERBANDINGAN OPENVZ DENGAN KERNEL BASED VIRTUAL MACHINE (KVM)." Jurnal Ilmiah Matrik 20, no. 2 (January 25, 2019): 129–35. http://dx.doi.org/10.33557/jurnalmatrik.v20i2.115.
Full textSun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, and Xiaojiang Du. "Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective." Security and Communication Networks 2019 (March 14, 2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.
Full textFathsyah, Muhammad Munaza, Irawan Hadi, and Irma Salamah. "Implementasi Virtual Private Network Failover Menggunakan Mikrotik Pada Jaringan Lokal Politeknik Negeri Sriwijaya." Jurnal Teknik Komputer 7, no. 2 (July 29, 2021): 222–28. http://dx.doi.org/10.31294/jtk.v7i2.11077.
Full textMohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur, and Iman Hazwam Abd Halim. "SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.
Full textFan, Pei Ying, and Yang Qiu. "Integration of Network Resources Based on Unified Identity Authentication." Applied Mechanics and Materials 623 (August 2014): 258–61. http://dx.doi.org/10.4028/www.scientific.net/amm.623.258.
Full textFawaid, Ibnu Haris, Diah Risqiwati, and Denar Regata Akbi. "Rancang Bangun Mirror Repository Linux Menggunakan Load-Balanced Mirror Service System (LMSS) Pada Private Cloud." Jurnal Repositor 2, no. 1 (January 4, 2020): 35. http://dx.doi.org/10.22219/repositor.v2i1.327.
Full textDiana, Diana, Javier Rezon Gumiri, and Ali Wandra. "Optimasi Keamanan Virtual Private Network Untuk Komunikasi Data Di Pusat Informasi Pengembangan Pemukiman Dan Bangunan (PIP2B)." Pseudocode 8, no. 1 (March 10, 2021): 76–89. http://dx.doi.org/10.33369/pseudocode.8.1.76-89.
Full textRuslianto, Ikhwan. "Perancangan dan Implementasi Virtual Private Network (VPN) menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura." Computer Engineering, Science and System Journal 4, no. 1 (February 6, 2019): 74. http://dx.doi.org/10.24114/cess.v4i1.11792.
Full textKamil, Idham, Julham Julham, Muharman Lubis, and Arif Ridho Lubis. "Management maintenance system for remote control based on microcontroller and virtual private server." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1349. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1349-1355.
Full textSyani, Mamay, and Bayu Saputro. "Implementasi Remote Monitoring Pada Virtual Private Server Berbasis Telegram Bot Api (Studi Kasus Politeknik Tedc Bandung." Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) 4, no. 2 (March 31, 2021): 94–111. http://dx.doi.org/10.47970/siskom-kb.v4i2.190.
Full textSidik, Sidik, Ade Sudaryana, and Rame Santoso. "Implementasi Virtual Interface Menggunakan Metode EOIP Tunnel Pada Jaringan WAN PT. Indo Matra Lestari." Jurnal Teknik Komputer 6, no. 1 (January 10, 2020): 103–10. http://dx.doi.org/10.31294/jtk.v6i1.6830.
Full textTanaka, Miyoko, Akane Tameike, Nobuhiro Ishikawa, and Kazuo Furuya. "Development and Application of an Internet Electron Microscopy System for the Outreach Program in Japan." Microscopy and Microanalysis 14, no. 2 (March 3, 2008): 176–83. http://dx.doi.org/10.1017/s1431927608080070.
Full textLi, Yuanming, Wei Guo, Xuejun Meng, and Wen Xia. "Charging wireless sensor network security technology based on encryption algorithms and dynamic model." International Journal of Distributed Sensor Networks 16, no. 3 (February 29, 2020): 155014772090199. http://dx.doi.org/10.1177/1550147720901999.
Full textKraft, Daniel. "Game Channels for Trustless Off-Chain Interactions in Decentralized Virtual Worlds." Ledger 1 (December 21, 2016): 84–98. http://dx.doi.org/10.5195/ledger.2016.15.
Full textGinanjar, Herdiansyah Pratama, and Angga Setiyadi. "PENERAPAN TEKNOLOGI CLOUD COMPUTING PADA KATALOG PRODUK DI BALATKOP JAWA BARAT." Komputa : Jurnal Ilmiah Komputer dan Informatika 9, no. 1 (March 23, 2020): 25–33. http://dx.doi.org/10.34010/komputa.v9i1.3722.
Full textJunaidi, Agus, Retno Wardhani, and Masruroh Masruroh. "MEMBANGUN CLOUD COMPUTING UNTUK MANAGEMEN DATA PADA UNIVERSITAS ISLAM LAMONGAN." Jurnal Teknika 10, no. 1 (May 2, 2018): 975. http://dx.doi.org/10.30736/teknika.v10i1.204.
Full textRuwaida, Devi, and Dian Kurnia. "RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP) DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA." Computer Engineering, Science and System Journal 3, no. 1 (January 31, 2018): 45. http://dx.doi.org/10.24114/cess.v3i1.8267.
Full textMin, Jie, Junbin Liang, Xingpo Ma, and Hongling Chen. "STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems." Security and Communication Networks 2021 (May 28, 2021): 1–16. http://dx.doi.org/10.1155/2021/9939796.
Full textSubekti, Mohammad, Anthoni Tandiono, Fenky Tania, and Hendro Wibowo A. "E-Commerce untuk Mendukung Business to Business Menggunakan Dynamic Dbmss: Studi Kasus pada Perusahaan Dagang Cross Tech." ComTech: Computer, Mathematics and Engineering Applications 3, no. 1 (June 1, 2012): 663. http://dx.doi.org/10.21512/comtech.v3i1.2465.
Full textPoddubnyi, I. V. "ON THE ISSUE OF THE USE OF INFORMATION AND COMMUNICATION TECHNOLOGIES BY THE DEFENDANTS IN ORDER TO HIDE THE THEFT FROM THE BANK ACCOUNTS OF CITIZENS." Bulletin of Udmurt University. Series Economics and Law 30, no. 3 (June 26, 2020): 424–30. http://dx.doi.org/10.35634/2412-9593-2020-30-3-424-430.
Full textAzhar, Raisul, Heroe Santoso, and Faisal Faisal. "Analisa Quality Of Service Menggunakan Aplikasi Gnump3d sebagai Server Media Streaming." Jurnal Bumigora Information Technology (BITe) 3, no. 1 (July 10, 2021): 45–55. http://dx.doi.org/10.30812/bite.v3i1.1320.
Full textJung, Younchan, and Ronnel Agulto. "Virtual IP-Based Secure Gatekeeper System for Internet of Things." Sensors 21, no. 1 (December 23, 2020): 38. http://dx.doi.org/10.3390/s21010038.
Full textTran, Duc Trong. "Exploiting a drainage database via internet." Science and Technology Development Journal 19, no. 2 (June 30, 2016): 67–74. http://dx.doi.org/10.32508/stdj.v19i2.669.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textXiong, Yong-Hua, Shao-Yun Wan, Yong He, and Dan Su. "Design and Implementation of a Prototype Cloud Video Surveillance System." Journal of Advanced Computational Intelligence and Intelligent Informatics 18, no. 1 (January 20, 2014): 40–47. http://dx.doi.org/10.20965/jaciii.2014.p0040.
Full textBhandari, Rupesh, and Kirubanand V B. "Enhanced encryption technique for secure iot data transmission." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 3732. http://dx.doi.org/10.11591/ijece.v9i5.pp3732-3738.
Full text