Artículos de revistas sobre el tema "Internet (computer network)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Internet (computer network)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Texto completoAyu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Texto completoSakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.
Texto completoNemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.
Texto completoAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Texto completoM.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.
Texto completoDasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.
Texto completoAndhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.
Texto completoSaddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Texto completoZulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.
Texto completoGoffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.
Texto completoAriyadi, Tamsir, Timur Dali Purwanto, and Muhamad Malik Fajar. "IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA." JURNAL ILMIAH INFORMATIKA 11, no. 02 (September 5, 2023): 189–95. http://dx.doi.org/10.33884/jif.v11i02.8032.
Texto completoBorisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.
Texto completoSitanggang, Andri Sahata, R. Fenny Syafariani, Novrini Hasti, Febilita Wulan Sari, and Dhara Pasya. "LAN network architecture design at Nurul Jalal Islamic Boarding School, North Jakarta." International Journal of Advances in Applied Sciences 13, no. 1 (March 1, 2024): 123. http://dx.doi.org/10.11591/ijaas.v13.i1.pp123-133.
Texto completoMagnaye, Nicko A. "Advancements in computer network technologies: A review." Metaverse 5, no. 1 (April 25, 2024): 2315. http://dx.doi.org/10.54517/m.v5i1.2315.
Texto completoAfrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (September 9, 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.
Texto completoMahmud, Mahmud, and Yarza Aprizal. "The Penerapan QoS (Quality Of Service) Dalam Menganalisis Kualitas Kinerja Jaringan Komputer (Studi Kasus Hotel Maxone Palembang)." Journal of Information System Research (JOSH) 3, no. 4 (July 31, 2022): 374–79. http://dx.doi.org/10.47065/josh.v3i4.1567.
Texto completoMulyadi. "PENERAPAN IP VERSI 6 DALAM MEMBANGUN JARINGAN LAN." Jurnal Informatika Komputer, Bisnis dan Manajemen 19, no. 3 (November 20, 2023): 16–26. http://dx.doi.org/10.61805/fahma.v19i3.49.
Texto completoSanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (January 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.
Texto completoNoviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network." Journal of Information Technology 2, no. 2 (August 24, 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.
Texto completoKeller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.
Texto completoArmanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau." Jurnal Ilmiah Betrik 10, no. 03 (November 14, 2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.
Texto completoSubhi, Doaa, and Laszlo Bacsardi. "Using Quantum Nodes Connected via the Quantum Cloud to Perform IoT Quantum Network." Condensed Matter 8, no. 1 (February 23, 2023): 24. http://dx.doi.org/10.3390/condmat8010024.
Texto completoAdhar, Sandi, and Usep Saprudin. "Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer." JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) 6, no. 1 (January 20, 2023): 23. http://dx.doi.org/10.56327/jtksi.v6i1.1388.
Texto completoChen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.
Texto completoHusna, Muhammad Aliyul, and Perani Rosyani. "Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (December 30, 2021): 247. http://dx.doi.org/10.30865/jurikom.v8i6.3631.
Texto completoFilimonova, N. A., and S. I. Rakin. "Calculation of Data Flow in Local Computer Networks. Combined (Experimental + Computer Simulation) Approach." WSEAS TRANSACTIONS ON COMMUNICATIONS 22 (March 17, 2023): 32–42. http://dx.doi.org/10.37394/23204.2023.22.3.
Texto completoHart, Joseph. "Computer Communications for Advisors." NACADA Journal 13, no. 2 (September 1, 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.
Texto completoZhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.
Texto completoBamgbose, Augustine Adeoye. "Internet adoption in select Nigeria university libraries." Information Impact: Journal of Information and Knowledge Management 14, no. 2 (January 9, 2024): 16–33. http://dx.doi.org/10.4314/iijikm.v14i2.2.
Texto completoCarius, Ana Carolina, Claro Ribeiro Pires, Vanessa Moreira Wendling, and Eduardo Campos Papa. "Resilience in computer networks and personal well-being: Computer engineering at the service of digital life." Conjecturas 21, no. 5 (November 18, 2021): 705–16. http://dx.doi.org/10.53660/conj-317-515.
Texto completoRaharjo, Mugi, Frengki Pernando, and Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)." Jurnal Teknik Komputer 5, no. 1 (February 11, 2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.
Texto completoZhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.
Texto completoOdhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (December 4, 2012): 302–9. http://dx.doi.org/10.48084/etasr.145.
Texto completoYuliana, Dela, and I. Komang Ari Mogi. "Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 2 (November 24, 2020): 235. http://dx.doi.org/10.24843/jlk.2020.v09.i02.p10.
Texto completoDzulfikar, Mohammad, Anton Anton, and Fitra Septia Nugraha. "IMPLEMENTATION OF SHARED INTERNET SERVICE COMPUTER NETWORK (RT/RW NET) HOME.NET." Journal of Information System, Informatics and Computing 7, no. 1 (June 19, 2023): 36. http://dx.doi.org/10.52362/jisicom.v7i1.1050.
Texto completoWan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.
Texto completoTedyyana, Agus, and Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway." INOVTEK Polbeng - Seri Informatika 3, no. 1 (June 3, 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.
Texto completoWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (July 24, 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Texto completoZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Texto completoHuang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 3 (June 26, 2024): p13. http://dx.doi.org/10.22158/sssr.v5n3p13.
Texto completoHuang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 2 (June 26, 2024): p191. http://dx.doi.org/10.22158/sssr.v5n2p191.
Texto completoRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Texto completoWang, Zhi Kun. "Application of Complex Network Theory in Computer Network Topology Optimization Research." Advanced Materials Research 989-994 (July 2014): 4237–40. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4237.
Texto completoSheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.
Texto completoSaputro, Bagus Aji. "Network Security Analysis and Bandwidth Management." International Journal of Science, Engineering and Information Technology 5, no. 02 (July 27, 2021): 260–65. http://dx.doi.org/10.21107/ijseit.v5i02.6481.
Texto completoHoward, Matthew D. "Network security (and the internet)." International Journal of Network Management 5, no. 6 (November 1995): 296–304. http://dx.doi.org/10.1002/nem.4560050604.
Texto completoUpadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.
Texto completoGanapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera." American Journal of Trade and Policy 6, no. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.
Texto completoQian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.
Texto completo