Journal articles on the topic 'VPN'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'VPN.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kazén, Miguel. "Problemessen vs. Spaßessen." Zeitschrift für Gesundheitspsychologie 14, no. 2 (April 2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.
Full textLeutner, Detlev, Anke Barthel, and Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment." Zeitschrift für Pädagogische Psychologie 15, no. 3/4 (November 2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.
Full textKempter, Guido, and Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale." Zeitschrift für Sozialpsychologie 31, no. 2 (June 2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.
Full textLee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi, and Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification." Journal of Korean Institute of Communications and Information Sciences 47, no. 11 (November 30, 2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.
Full textAnbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson, and Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment." Journal of General Virology 95, no. 2 (February 1, 2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.
Full textKher, Bhushan, Preeti Karmore, Nutan Sonwane, Amol Gahane, Nitin Meshram, Kartik Ghagre, Himanshu Nandekar, and Sonal Borkar. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.
Full textMardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (December 1, 2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.
Full textZelenkina, A. S., E. A. Pavlyukevich, and A. V. Ponachugin. "VPN: USE, SECURITY, RISKS." ITNOU: Information technologies in science, education and management 1, no. 19 (December 2022): 45–48. http://dx.doi.org/10.47501/itnou.2022.1.45-48.
Full textZhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (May 2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.
Full textAnwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (June 2, 2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.
Full textLiu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.
Full textMohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur, and Iman Hazwam Abd Halim. "SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.
Full textKempter, Guido. "Scriptanimation. Methode zur Beschreibung und Darstellung natürlicher menschlicher Bewegungen." Experimental Psychology 46, no. 2 (April 1999): 129–34. http://dx.doi.org/10.1026//0949-3964.46.2.129.
Full textJaafar, Fauziah Mohd, Houssam Attoui, Peter P. C. Mertens, Philippe de Micco, and Xavier de Lamballerie. "Structural organization of an encephalitic human isolate of Banna virus (genus Seadornavirus, family Reoviridae)." Journal of General Virology 86, no. 4 (April 1, 2005): 1147–57. http://dx.doi.org/10.1099/vir.0.80578-0.
Full textFan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.
Full textMahardiyanto, Muliatama Putra. "Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, no. 2 (November 7, 2016): 26–32. http://dx.doi.org/10.33795/jartel.v3i2.217.
Full textRahman, Taufik, Giovanni Maria Vianney Tobia Mariatmojo, Hafis Nurdin, and Herman Kuswanto. "Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi." Teknika 11, no. 2 (July 1, 2022): 138–47. http://dx.doi.org/10.34148/teknika.v11i2.482.
Full textChen, Jianyun, and Chunyan Li. "Research on meteorological information network security system based on VPN Technology." MATEC Web of Conferences 232 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201823201001.
Full textFan, Ya Qin, Hao Fan, and Chao Sun. "OPNET-Based Computer Simulation of MPLS VPN Security Solutions." Applied Mechanics and Materials 40-41 (November 2010): 361–65. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.361.
Full textHaeruddin, Haeruddin, and Kelvin Kelvin. "Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19." Jurnal Ilmu Komputer dan Bisnis 13, no. 1 (May 1, 2022): 105–14. http://dx.doi.org/10.47927/jikb.v13i1.279.
Full textFan, Ya Qin, Sheng Sheng Qian, and Feng Shan Liang. "VPN Security Technology Theory Modeling and Simulation." Applied Mechanics and Materials 135-136 (October 2011): 1114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1114.
Full textAriyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (June 15, 2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.
Full textSupriyanto, Bambang, and Suharyanto Suharyanto. "Perancangan Jaringan VPN Menggunakan Metode Point To Point Tunneling Protocol." Jurnal Teknik Komputer 5, no. 2 (August 1, 2019): 235–40. http://dx.doi.org/10.31294/jtk.v5i2.5452.
Full textMohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study." Al-Nahrain Journal for Engineering Sciences 22, no. 4 (December 20, 2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.
Full textNovanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (March 12, 2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.
Full textHyatt, A. D. "Exposure of protein VP7 on the surface of bluetongue virus." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 3 (August 12, 1990): 600–601. http://dx.doi.org/10.1017/s0424820100160558.
Full textSulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.
Full textQian, Xuan Yu, Shi Min Liu, Cheng Zhou, and Xiao Juan Guan. "Research of Network Testing Based on MPLS L2VPN." Advanced Materials Research 791-793 (September 2013): 1695–98. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1695.
Full textKuang, Ai Nong. "Application Research of Computer Network Load Certification Constructing VPN Tunnel Technology." Advanced Materials Research 926-930 (May 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2217.
Full textKhan, Muhammad U. S., Syed M. A. H. Bukhari, Tahir Maqsood, Muhammad A. B. Fayyaz, Darren Dancey, and Raheel Nawaz. "SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic." Electronics 11, no. 3 (January 24, 2022): 350. http://dx.doi.org/10.3390/electronics11030350.
Full textPangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (June 9, 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.
Full textSun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.
Full textPangestu, Raka Nugraha, Risma Yanti, and Herlina Harahap. "Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (June 19, 2021): 27–33. http://dx.doi.org/10.35447/jikstra.v3i1.357.
Full textMaulidi, A., M. Abdullah, and DW Handani. "Virtual private network (VPN) model for AIS real time monitoring." IOP Conference Series: Earth and Environmental Science 1081, no. 1 (September 1, 2022): 012028. http://dx.doi.org/10.1088/1755-1315/1081/1/012028.
Full textAlashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 20, 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.
Full textSantoso, Budi, Asrul Sani, T. Husain, and Nedi Hendri. "VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC." TEKNOKOM 4, no. 1 (June 10, 2021): 30–36. http://dx.doi.org/10.31943/teknokom.v4i1.59.
Full textSari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (July 21, 2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.
Full textShepherd, Frances, Diana Herrera-Ibata, Elizabeth Porter, Nitipong Homwong, Richard Hesse, Jianfa Bai, and Douglas Marthaler. "Whole Genome Classification and Phylogenetic Analyses of Rotavirus B strains from the United States." Pathogens 7, no. 2 (April 18, 2018): 44. http://dx.doi.org/10.3390/pathogens7020044.
Full textMufida, Elly, Dedi Irawan, and Giatika Chrisnawati. "Remote Site Mikrotik VPN Dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus pada Yayasan Teratai Global Jakarta." Jurnal Matrik 16, no. 2 (July 25, 2017): 9. http://dx.doi.org/10.30812/matrik.v16i2.7.
Full textTriyansa, Farizal, and Irwan Agus Sobari. "Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima." Computer Science (CO-SCIENCE) 2, no. 2 (July 28, 2022): 82–89. http://dx.doi.org/10.31294/coscience.v2i2.1168.
Full textLi, Song, Qian Zou, and Wei Huang. "VPN Packet Loss-Oriented Dynamic Control." Applied Mechanics and Materials 340 (July 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amm.340.710.
Full textDarojat, Agus, and Ida Nurhaida. "ANALISA QOS ADMINISTRATIVE DISTANCE STATIC ROUTE PADA FAILOVER VPN IPSEC." Jurnal Ilmu Teknik dan Komputer 3, no. 1 (January 14, 2019): 11. http://dx.doi.org/10.22441/jitkom.2020.v3.i1.002.
Full textMira, Des, and Romi Wiryadinata. "Implementasi Jaringan VPN Berbasis Mikrotik." Jurnal Ilmu Komputer dan Bisnis 11, no. 2 (November 16, 2020): 2455–64. http://dx.doi.org/10.47927/jikb.v11i2.232.
Full textDesmira, Desmira, and Romi Wiryadinata. "Implementasi Jaringan VPN Berbasis Mikrotik: Studi Kasus pada Kantor Kecamatan Walantaka." Jurnal Ilmu Komputer dan Bisnis 11, no. 2 (November 22, 2020): 2455–64. http://dx.doi.org/10.47927/jikb.v11i2.8.
Full textMusril, Hari Antoni. "Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, no. 2 (March 15, 2019): 83–88. http://dx.doi.org/10.30743/infotekjar.v3i2.1055.
Full textHidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (December 7, 2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Full textGustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (August 28, 2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.
Full textHudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.
Full textRoberson, Shannon, Mohammad Abdus Salam, Mathieu Kourouma, and Osman Kandara. "Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic." International Journal of Computer Science and Information Technology 14, no. 1 (February 28, 2022): 63–74. http://dx.doi.org/10.5121/ijcsit.2022.14105.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (December 11, 2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full text