Journal articles on the topic 'Virtual Private Network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Virtual Private Network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (August 31, 2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.
Full textKnapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (January 2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.
Full textWright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (July 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.
Full textScott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (August 1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.
Full textKhizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (June 15, 2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.
Full textTAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (November 1, 2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.
Full textSobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.
Full textCrocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (January 1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.
Full textSu, Y., Y. Tian, E. Wong, N. Nadarajah, and C. C. K. Chan. "All-optical virtual private network in passive optical networks." Laser & Photonics Review 2, no. 6 (December 11, 2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.
Full text., Ekwe O. A. "VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY." International Journal of Research in Engineering and Technology 03, no. 05 (May 25, 2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.
Full textRana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (April 1, 2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.
Full textFaizal, Faizal, and Andi Irmayana. "Sistem Persuratan Digital Berbasis Virtual Private Network." DoubleClick: Journal of Computer and Information Technology 5, no. 1 (August 31, 2021): 33. http://dx.doi.org/10.25273/doubleclick.v5i1.9121.
Full textChou, David C., David C. Yen, and Amy Y. Chou. "Adopting virtual private network for electronic commerce." Industrial Management & Data Systems 105, no. 2 (February 2005): 223–36. http://dx.doi.org/10.1108/02635570510583343.
Full textKeng Lim, L., Jun Gao, T. S. Eugene Ng, Prashant R. Chandra, Peter Steenkiste, and Hui Zhang. "Customizable virtual private network service with QoS." Computer Networks 36, no. 2-3 (July 2001): 137–51. http://dx.doi.org/10.1016/s1389-1286(01)00173-6.
Full textEisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." SIAM Journal on Computing 37, no. 3 (January 2007): 706–21. http://dx.doi.org/10.1137/060654827.
Full textAltın, A., E. Amaldi, P. Belotti, and M. Ç. Pınar. "Virtual Private Network Design Under Traffic Uncertainty." Electronic Notes in Discrete Mathematics 17 (October 2004): 19–22. http://dx.doi.org/10.1016/j.endm.2004.03.007.
Full textKang, Sunyoung, Hyuncheol Kim, and Seungae Kang. "Virtual private network for wellness sports information." Multimedia Tools and Applications 74, no. 16 (June 24, 2014): 6497–507. http://dx.doi.org/10.1007/s11042-014-2096-x.
Full textYu, Wei, and Jian Wang. "Scalable network resource management for large scale Virtual Private Networks." Simulation Modelling Practice and Theory 12, no. 3-4 (July 2004): 263–85. http://dx.doi.org/10.1016/j.simpat.2004.02.002.
Full textKhan, Yusera Farooq. "Cisco Secured Virtual Private Networks: A Review." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 30–33. http://dx.doi.org/10.51983/ajcst-2018.7.2.1886.
Full textLizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.
Full textMarzuki, Khairan, Muhammad Idham Kholid, I. Putu Hariyadi, and Lalu Zazuli Azhar Mardedi. "Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment." International Journal of Electronics and Communications Systems 3, no. 1 (June 28, 2023): 11. http://dx.doi.org/10.24042/ijecs.v3i1.16524.
Full textEkawati, Inna, and Dadan Irwan. "Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik." JREC (Journal of Electrical and Electronics) 9, no. 1 (November 25, 2021): 41–48. http://dx.doi.org/10.33558/jrec.v9i1.3110.
Full textAbdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (November 10, 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.
Full textSari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (July 21, 2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.
Full textShi, Baohui. "Computer Network Information Security Protection Based on Virtual Private Network." Journal of Physics: Conference Series 1646 (September 2020): 012121. http://dx.doi.org/10.1088/1742-6596/1646/1/012121.
Full textMakhija, Deven. "5G Communication Systems: Network Slicing and Virtual Private Network Architecture." ITM Web of Conferences 54 (2023): 02001. http://dx.doi.org/10.1051/itmconf/20235402001.
Full textTimberg, Chris, Leah Liebovitz, and Ben Miller. "The Private Virtual Network Operator Model for Field Area Network." Climate and Energy 40, no. 6 (December 5, 2023): 8–16. http://dx.doi.org/10.1002/gas.22381.
Full textQu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network." Applied Mechanics and Materials 475-476 (December 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.
Full textMiller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (July 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.
Full textLota, Stanislaw, and Marcin Markowski. "Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment." Journal of Applied Computer Science Methods 7, no. 2 (November 1, 2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.
Full textDayana, D. S. "An Efficient Approach for Network Mobility Based on AES Algorithm." Advanced Materials Research 984-985 (July 2014): 1269–75. http://dx.doi.org/10.4028/www.scientific.net/amr.984-985.1269.
Full textKrile, Srecko, and Martin Medvecky. "Virtual Network Construction Technique, Treating All VPNs Simultaneously." Elektronika ir Elektrotechnika 26, no. 2 (April 25, 2020): 77–84. http://dx.doi.org/10.5755/j01.eie.26.2.22981.
Full textSobh, Tarek S., and Awad H. Khalil. "Securing Wargames System Using Effective Virtual Private Network." Recent Patents on Computer Science 11, no. 4 (December 13, 2018): 289–301. http://dx.doi.org/10.2174/2213275911666181002140451.
Full textIryani, Nanda, and Dyas Dendi Andika. "Implementasi Dynamic Multipoint Virtual Private Network Dual Hub." Jurnal Telekomunikasi dan Komputer 11, no. 2 (August 20, 2021): 118. http://dx.doi.org/10.22441/incomtech.v11i2.10839.
Full textBen-Yacoub, Leila Lamti. "On managing traffic over virtual private network links." Journal of Communications and Networks 2, no. 2 (June 2000): 138–46. http://dx.doi.org/10.1109/jcn.2000.6596734.
Full textSuryani, Erma, and Syamsu Nur Row Honey. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS." JUTI: Jurnal Ilmiah Teknologi Informasi 6, no. 1 (January 1, 2007): 31. http://dx.doi.org/10.12962/j24068535.v6i1.a185.
Full textCui, Wei, and Mostafa A. Bassiouni. "Virtual private network bandwidth management with traffic prediction." Computer Networks 42, no. 6 (August 2003): 765–78. http://dx.doi.org/10.1016/s1389-1286(03)00217-2.
Full textWu, Jing, Michel Savoie, Scott Campbell, Hanxi Zhang, and Bill Arnaud. "Layer 1 virtual private network management by users." IEEE Communications Magazine 44, no. 12 (December 2006): 86–93. http://dx.doi.org/10.1109/mcom.2006.273104.
Full textMoradi, Ahmad, Andrea Lodi, and S. Mehdi Hashemi. "On the difficulty of virtual private network instances." Networks 63, no. 4 (March 7, 2014): 327–33. http://dx.doi.org/10.1002/net.21548.
Full textBhat, Anjum Zameer, and Imran Ahmed. "A Simulation Environment for enhancing the student experience in advanced networking concepts." SHS Web of Conferences 156 (2023): 07003. http://dx.doi.org/10.1051/shsconf/202315607003.
Full textÁlvarez, David, Pelayo Nuño, Carlos T. González, Francisco G. Bulnes, Juan C. Granda, and Dan García-Carrillo. "Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks." Sensors 23, no. 4 (February 4, 2023): 1747. http://dx.doi.org/10.3390/s23041747.
Full textUsanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (July 30, 2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.
Full textRoşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.
Full textNourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.
Full textQu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System." Applied Mechanics and Materials 321-324 (June 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.
Full textPeng, Kai. "Construction and Exploration of Corporate Virtual Private Networks." Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.
Full textYin, Chengrui. "Application of Virtual Private Network Technology in University Network Information Security." Journal of Physics: Conference Series 1915, no. 4 (May 1, 2021): 042071. http://dx.doi.org/10.1088/1742-6596/1915/4/042071.
Full textHidayatulloh, Syarif, and Wahyudin Wahyudin. "Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)." Jurnal Teknik Komputer 5, no. 1 (February 6, 2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.
Full textFajjari, Ilhem, Nadjib Aitsaadi, Boutheina Dab, and Guy Pujolle. "Novel adaptive virtual network embedding algorithm for Cloud’s private backbone network." Computer Communications 84 (June 2016): 12–24. http://dx.doi.org/10.1016/j.comcom.2016.03.019.
Full textZhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.
Full text