Articoli di riviste sul tema "VPN"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "VPN".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Kazén, Miguel. "Problemessen vs. Spaßessen". Zeitschrift für Gesundheitspsychologie 14, n. 2 (aprile 2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.
Testo completoLeutner, Detlev, Anke Barthel e Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment". Zeitschrift für Pädagogische Psychologie 15, n. 3/4 (novembre 2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.
Testo completoKempter, Guido, e Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale". Zeitschrift für Sozialpsychologie 31, n. 2 (giugno 2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.
Testo completoLee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi e Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification". Journal of Korean Institute of Communications and Information Sciences 47, n. 11 (30 novembre 2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.
Testo completoAnbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson e Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment". Journal of General Virology 95, n. 2 (1 febbraio 2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.
Testo completoKher, Bhushan, Preeti Karmore, Nutan Sonwane, Amol Gahane, Nitin Meshram, Kartik Ghagre, Himanshu Nandekar e Sonal Borkar. "Apnavpn Project". International Journal for Research in Applied Science and Engineering Technology 10, n. 4 (30 aprile 2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.
Testo completoMardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3". Jurnal Sains dan Informatika 5, n. 2 (1 dicembre 2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.
Testo completoZelenkina, A. S., E. A. Pavlyukevich e A. V. Ponachugin. "VPN: USE, SECURITY, RISKS". ITNOU: Information technologies in science, education and management 1, n. 19 (dicembre 2022): 45–48. http://dx.doi.org/10.47501/itnou.2022.1.45-48.
Testo completoZhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu e Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN". Photonic Network Communications 7, n. 3 (maggio 2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.
Testo completoAnwar, Rian Septian, e Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server". INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, n. 2 (2 giugno 2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.
Testo completoLiu, Zai Ying, Ping Yang e Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms". Applied Mechanics and Materials 380-384 (agosto 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.
Testo completoMohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur e Iman Hazwam Abd Halim. "SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network". Journal of Computing Research and Innovation 6, n. 4 (20 settembre 2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.
Testo completoKempter, Guido. "Scriptanimation. Methode zur Beschreibung und Darstellung natürlicher menschlicher Bewegungen". Experimental Psychology 46, n. 2 (aprile 1999): 129–34. http://dx.doi.org/10.1026//0949-3964.46.2.129.
Testo completoJaafar, Fauziah Mohd, Houssam Attoui, Peter P. C. Mertens, Philippe de Micco e Xavier de Lamballerie. "Structural organization of an encephalitic human isolate of Banna virus (genus Seadornavirus, family Reoviridae)". Journal of General Virology 86, n. 4 (1 aprile 2005): 1147–57. http://dx.doi.org/10.1099/vir.0.80578-0.
Testo completoFan, Ya Qin, Ling Lv, Mei Lin Liu e Fei Xie. "Improvements Based on the IPSec VPN Secuirity". Advanced Materials Research 756-759 (settembre 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.
Testo completoMahardiyanto, Muliatama Putra. "Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang". Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, n. 2 (7 novembre 2016): 26–32. http://dx.doi.org/10.33795/jartel.v3i2.217.
Testo completoRahman, Taufik, Giovanni Maria Vianney Tobia Mariatmojo, Hafis Nurdin e Herman Kuswanto. "Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi". Teknika 11, n. 2 (1 luglio 2022): 138–47. http://dx.doi.org/10.34148/teknika.v11i2.482.
Testo completoChen, Jianyun, e Chunyan Li. "Research on meteorological information network security system based on VPN Technology". MATEC Web of Conferences 232 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201823201001.
Testo completoFan, Ya Qin, Hao Fan e Chao Sun. "OPNET-Based Computer Simulation of MPLS VPN Security Solutions". Applied Mechanics and Materials 40-41 (novembre 2010): 361–65. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.361.
Testo completoHaeruddin, Haeruddin, e Kelvin Kelvin. "Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19". Jurnal Ilmu Komputer dan Bisnis 13, n. 1 (1 maggio 2022): 105–14. http://dx.doi.org/10.47927/jikb.v13i1.279.
Testo completoFan, Ya Qin, Sheng Sheng Qian e Feng Shan Liang. "VPN Security Technology Theory Modeling and Simulation". Applied Mechanics and Materials 135-136 (ottobre 2011): 1114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1114.
Testo completoAriyadi, Tamsir, e Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security". INOVTEK Polbeng - Seri Informatika 6, n. 1 (15 giugno 2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.
Testo completoSupriyanto, Bambang, e Suharyanto Suharyanto. "Perancangan Jaringan VPN Menggunakan Metode Point To Point Tunneling Protocol". Jurnal Teknik Komputer 5, n. 2 (1 agosto 2019): 235–40. http://dx.doi.org/10.31294/jtk.v5i2.5452.
Testo completoMohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study". Al-Nahrain Journal for Engineering Sciences 22, n. 4 (20 dicembre 2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.
Testo completoNovanto, Mukhammad Rizki, Joseph Dedy Irawan e F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB". JATI (Jurnal Mahasiswa Teknik Informatika) 6, n. 1 (12 marzo 2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.
Testo completoHyatt, A. D. "Exposure of protein VP7 on the surface of bluetongue virus". Proceedings, annual meeting, Electron Microscopy Society of America 48, n. 3 (12 agosto 1990): 600–601. http://dx.doi.org/10.1017/s0424820100160558.
Testo completoSulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK". PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, n. 2 (1 settembre 2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.
Testo completoQian, Xuan Yu, Shi Min Liu, Cheng Zhou e Xiao Juan Guan. "Research of Network Testing Based on MPLS L2VPN". Advanced Materials Research 791-793 (settembre 2013): 1695–98. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1695.
Testo completoKuang, Ai Nong. "Application Research of Computer Network Load Certification Constructing VPN Tunnel Technology". Advanced Materials Research 926-930 (maggio 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2217.
Testo completoKhan, Muhammad U. S., Syed M. A. H. Bukhari, Tahir Maqsood, Muhammad A. B. Fayyaz, Darren Dancey e Raheel Nawaz. "SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic". Electronics 11, n. 3 (24 gennaio 2022): 350. http://dx.doi.org/10.3390/electronics11030350.
Testo completoPangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling". JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, n. 2 (9 giugno 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.
Testo completoSun, Yunxiao, Bailing Wang, Chao Wang e Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System". Security and Communication Networks 2021 (21 ottobre 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.
Testo completoPangestu, Raka Nugraha, Risma Yanti e Herlina Harahap. "Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer". Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, n. 1 (19 giugno 2021): 27–33. http://dx.doi.org/10.35447/jikstra.v3i1.357.
Testo completoMaulidi, A., M. Abdullah e DW Handani. "Virtual private network (VPN) model for AIS real time monitoring". IOP Conference Series: Earth and Environmental Science 1081, n. 1 (1 settembre 2022): 012028. http://dx.doi.org/10.1088/1755-1315/1081/1/012028.
Testo completoAlashi, Shahad A., e Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia". Journal of Information Security and Cybercrimes Research 3, n. 1 (20 dicembre 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.
Testo completoSantoso, Budi, Asrul Sani, T. Husain e Nedi Hendri. "VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC". TEKNOKOM 4, n. 1 (10 giugno 2021): 30–36. http://dx.doi.org/10.31943/teknokom.v4i1.59.
Testo completoSari, Yosi Nofita, Dedy Irfan e Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School". Jurnal Paedagogy 9, n. 3 (21 luglio 2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.
Testo completoShepherd, Frances, Diana Herrera-Ibata, Elizabeth Porter, Nitipong Homwong, Richard Hesse, Jianfa Bai e Douglas Marthaler. "Whole Genome Classification and Phylogenetic Analyses of Rotavirus B strains from the United States". Pathogens 7, n. 2 (18 aprile 2018): 44. http://dx.doi.org/10.3390/pathogens7020044.
Testo completoMufida, Elly, Dedi Irawan e Giatika Chrisnawati. "Remote Site Mikrotik VPN Dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus pada Yayasan Teratai Global Jakarta". Jurnal Matrik 16, n. 2 (25 luglio 2017): 9. http://dx.doi.org/10.30812/matrik.v16i2.7.
Testo completoTriyansa, Farizal, e Irwan Agus Sobari. "Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima". Computer Science (CO-SCIENCE) 2, n. 2 (28 luglio 2022): 82–89. http://dx.doi.org/10.31294/coscience.v2i2.1168.
Testo completoLi, Song, Qian Zou e Wei Huang. "VPN Packet Loss-Oriented Dynamic Control". Applied Mechanics and Materials 340 (luglio 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amm.340.710.
Testo completoDarojat, Agus, e Ida Nurhaida. "ANALISA QOS ADMINISTRATIVE DISTANCE STATIC ROUTE PADA FAILOVER VPN IPSEC". Jurnal Ilmu Teknik dan Komputer 3, n. 1 (14 gennaio 2019): 11. http://dx.doi.org/10.22441/jitkom.2020.v3.i1.002.
Testo completoMira, Des, e Romi Wiryadinata. "Implementasi Jaringan VPN Berbasis Mikrotik". Jurnal Ilmu Komputer dan Bisnis 11, n. 2 (16 novembre 2020): 2455–64. http://dx.doi.org/10.47927/jikb.v11i2.232.
Testo completoDesmira, Desmira, e Romi Wiryadinata. "Implementasi Jaringan VPN Berbasis Mikrotik: Studi Kasus pada Kantor Kecamatan Walantaka". Jurnal Ilmu Komputer dan Bisnis 11, n. 2 (22 novembre 2020): 2455–64. http://dx.doi.org/10.47927/jikb.v11i2.8.
Testo completoMusril, Hari Antoni. "Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)". InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, n. 2 (15 marzo 2019): 83–88. http://dx.doi.org/10.30743/infotekjar.v3i2.1055.
Testo completoHidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG". IJISCS (International Journal of Information System and Computer Science) 3, n. 2 (7 dicembre 2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Testo completoGustiawan, Mokhamad, e Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik". Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, n. 4 (28 agosto 2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.
Testo completoHudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection". Defence Science Journal 71, n. 4 (1 luglio 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.
Testo completoRoberson, Shannon, Mohammad Abdus Salam, Mathieu Kourouma e Osman Kandara. "Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic". International Journal of Computer Science and Information Technology 14, n. 1 (28 febbraio 2022): 63–74. http://dx.doi.org/10.5121/ijcsit.2022.14105.
Testo completoUmaroh, Lia, e Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG". BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, n. 2 (11 dicembre 2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Testo completo