Articoli di riviste sul tema "Internet (computer network)"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Internet (computer network)".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, n. 9 (30 settembre 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Testo completoSakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro". Jurnal Pendidikan Madrasah 7, n. 2 (22 novembre 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.
Testo completoNemkova, N. V. "What is the Internet?" Kazan medical journal 78, n. 3 (15 giugno 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.
Testo completoAisyah, Siti. "Computer Networking Company in Business Area". International Research Journal of Management, IT & Social Sciences 2, n. 7 (1 luglio 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Testo completoM.J, Dr Kurian, e Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks". International Journal of Innovative Technology and Exploring Engineering 12, n. 3 (28 febbraio 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.
Testo completoDasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra e Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark". DoubleClick: Journal of Computer and Information Technology 5, n. 2 (27 febbraio 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.
Testo completoAndhika, Maulana Hafidz, Arip Solehudin, Didi Juardi e Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP". Elkom : Jurnal Elektronika dan Komputer 15, n. 1 (30 giugno 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.
Testo completoGoffe, William L. "Computer Network Resources for Economists". Journal of Economic Perspectives 8, n. 3 (1 agosto 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.
Testo completoBorisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin e Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols". Vestnik MEI, n. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.
Testo completoSanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks". Mathematics Teacher 89, n. 1 (gennaio 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.
Testo completoNoviani, Yulia Dwi. "Jurnal Jaringan Analisis dan Pengembangan Virtual Local Area Network". Journal of Information Technology 2, n. 2 (24 agosto 2020): 61–66. http://dx.doi.org/10.47292/joint.v2i2.31.
Testo completoAfrizal, Afrizal, e Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, n. 1 (9 settembre 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.
Testo completoKeller, Ariane, Daniel Borkmann, Stephan Neuhaus e Markus Happe. "Self-Awareness in Computer Networks". International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.
Testo completoChen, Hong Zhu. "Discussion on Computer Network Security". Applied Mechanics and Materials 427-429 (settembre 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.
Testo completoZhang, Kun, Hai Feng Wang, Jian Feng Zhu e Zhuang Li. "Computer Network Security Several Strategies". Key Engineering Materials 474-476 (aprile 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.
Testo completoArmanto, Armanto. "Implrmrntasi Policy Base Routing Dan Failover Menggunakan Router Mikrotik Untuk Membagi Jalur Akses Inter Di Fakultas Komputer Universitas Bina Insan Lubuklinggau". Jurnal Ilmiah Betrik 10, n. 03 (14 novembre 2019): 114–21. http://dx.doi.org/10.36050/betrik.v10i03.46.
Testo completoHart, Joseph. "Computer Communications for Advisors". NACADA Journal 13, n. 2 (1 settembre 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.
Testo completoSubhi, Doaa, e Laszlo Bacsardi. "Using Quantum Nodes Connected via the Quantum Cloud to Perform IoT Quantum Network". Condensed Matter 8, n. 1 (23 febbraio 2023): 24. http://dx.doi.org/10.3390/condmat8010024.
Testo completoZhuang, Dian Zheng, e Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet". Applied Mechanics and Materials 441 (dicembre 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.
Testo completoCarius, Ana Carolina, Claro Ribeiro Pires, Vanessa Moreira Wendling e Eduardo Campos Papa. "Resilience in computer networks and personal well-being: Computer engineering at the service of digital life". Conjecturas 21, n. 5 (18 novembre 2021): 705–16. http://dx.doi.org/10.53660/conj-317-515.
Testo completoOdhiambo, M. O., e P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce". Engineering, Technology & Applied Science Research 2, n. 6 (4 dicembre 2012): 302–9. http://dx.doi.org/10.48084/etasr.145.
Testo completoWan, Xue Yong, Liang Zhang, Wei Xu e Hong Hui Gong. "Computer Network Security Strategy Research". Applied Mechanics and Materials 599-601 (agosto 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.
Testo completoYuliana, Dela, e I. Komang Ari Mogi. "Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir". JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, n. 2 (24 novembre 2020): 235. http://dx.doi.org/10.24843/jlk.2020.v09.i02.p10.
Testo completoHusna, Muhammad Aliyul, e Perani Rosyani. "Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram". JURIKOM (Jurnal Riset Komputer) 8, n. 6 (30 dicembre 2021): 247. http://dx.doi.org/10.30865/jurikom.v8i6.3631.
Testo completoRaharjo, Mugi, Frengki Pernando e Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)". Jurnal Teknik Komputer 5, n. 1 (11 febbraio 2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.
Testo completoUpadhyay, Paramesh C., e Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks". International Journal of Mobile Computing and Multimedia Communications 2, n. 3 (luglio 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.
Testo completoWang, Zhi Kun. "Application of Complex Network Theory in Computer Network Topology Optimization Research". Advanced Materials Research 989-994 (luglio 2014): 4237–40. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4237.
Testo completoZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures". Applied Mechanics and Materials 433-435 (ottobre 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Testo completoSaputro, Bagus Aji. "Network Security Analysis and Bandwidth Management". International Journal of Science, Engineering and Information Technology 5, n. 02 (27 luglio 2021): 260–65. http://dx.doi.org/10.21107/ijseit.v5i02.6481.
Testo completoTedyyana, Agus, e Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway". INOVTEK Polbeng - Seri Informatika 3, n. 1 (3 giugno 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.
Testo completoBabosov, Ye М. "Contradictory use of computer technology in a modern network society". Proceedings of the National Academy of Sciences of Belarus, Humanitarian Series 64, n. 3 (16 agosto 2019): 289–98. http://dx.doi.org/10.29235/2524-2369-2019-64-3-289-298.
Testo completoButler, Declan. "Experts fear network paralysis as computer worms blast Internet". Nature 425, n. 6953 (settembre 2003): 3. http://dx.doi.org/10.1038/425003a.
Testo completoSheikh, Yelena Mujibur, e Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues". International Journal for Research in Applied Science and Engineering Technology 10, n. 3 (31 marzo 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.
Testo completoQian, Fengchen, Yalin Ye, Ning Shan e Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet". MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.
Testo completoPuzmanová, Rita. "Simple Internet network management text". Computer Communications 16, n. 4 (aprile 1993): 262. http://dx.doi.org/10.1016/0140-3664(93)90097-c.
Testo completoGanapathy, Apoorva. "Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera". American Journal of Trade and Policy 6, n. 3 (2019): 101–6. http://dx.doi.org/10.18034/ajtp.v6i3.543.
Testo completoWei, Li, e Da Zhi Deng. "A Novel Stable Algorithm of Getting User’s Account Based on Telnet Protocol". Applied Mechanics and Materials 299 (febbraio 2013): 130–34. http://dx.doi.org/10.4028/www.scientific.net/amm.299.130.
Testo completoVASILE, Cristinel Marius. "Firewall Technologies". International Journal of Information Security and Cybercrime 7, n. 1 (29 giugno 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Testo completoLiu, Yang, Jie Jiang, Jiahao Sun e Xianghan Wang. "InterNet+: A Light Network for Hand Pose Estimation". Sensors 21, n. 20 (11 ottobre 2021): 6747. http://dx.doi.org/10.3390/s21206747.
Testo completoAgarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha e Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things". International Journal of Grid and High Performance Computing 11, n. 3 (luglio 2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.
Testo completoDzhuliy, V. M., O. V. Miroshnichenko e L. V. Solodeeva. "METHOD OF CLASSIFICATION OF APPLICATIONS TRAFFIC OF COMPUTER NETWORKS ON THE BASIS OF MACHINE LEARNING UNDER UNCERTAINTY". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, n. 74 (2022): 73–82. http://dx.doi.org/10.17721/2519-481x/2022/74-07.
Testo completoSaleh, Khairul, e Tini Fitriani. "ANALISA SISTEM INFORMASI KEAMANAN INTERNET SPEEDY PADA PLASA TELKOM TANJUNGBALAI". JURNAL TEKNOLOGI INFORMASI 1, n. 2 (7 settembre 2018): 137. http://dx.doi.org/10.36294/jurti.v1i2.302.
Testo completoAlakbarov, Rashid. "AZSCIENCENET SCIENCE-COMPUTER NETWORK: STAGES OF DEVELOPMENT, INTERNET SERVICES AND PROSPECTS". Problems of Information Society 07, n. 1 (21 gennaio 2016): 11–20. http://dx.doi.org/10.25045/jpis.v07.i1.02.
Testo completoQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study". Advanced Materials Research 1079-1080 (dicembre 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Testo completoCERNOV, Ana-Maria. "Security in Computer Networks". International Journal of Information Security and Cybercrime 7, n. 1 (29 giugno 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Testo completoAbbate, Janet. "Government, Business, and the Making of the Internet". Business History Review 75, n. 1 (2001): 147–76. http://dx.doi.org/10.2307/3116559.
Testo completoKhasambiev, I. V., e E. A. Guseva. "Network architectures and protocols of M2M communications". Journal of Physics: Conference Series 2176, n. 1 (1 giugno 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2176/1/012019.
Testo completoLazarov, Andon D., e Petia Petrova. "Modelling Activity of a Malicious User in Computer Networks". Cybernetics and Information Technologies 22, n. 2 (1 giugno 2022): 86–95. http://dx.doi.org/10.2478/cait-2022-0018.
Testo completoHerlina, Elvi. "Bandwidth Management Design Analysis for Computer Network Infrastructure at SMKN 1 Abdya". Jurnal Manajemen Informatika Medicom (JMI) 10, n. 2 (30 settembre 2022): 21–25. http://dx.doi.org/10.35335/jmi.v10i2.4.
Testo completoZhao, Ying. "Local Area Network Information Security and Virus Countermeasures of the Internet". Advanced Materials Research 1079-1080 (dicembre 2014): 598–600. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.598.
Testo completo