has been cited by the following article(s):
[1]
|
Security of Modern Networks and Its Challenges
|
|
Cyber Security Using …,
2023 |
|
|
[2]
|
İletişim Teknolojilerinde Veri Güvenliği ve Uzaktan Erişim: VPN Kullanımı Üzerine Bir Vaka Çalışması
|
|
Bilgi Yönetimi,
2023 |
|
|
[3]
|
The Need and Impact of Implementing an Effective Virtual Private Network (VPN) in the Retail Business Sector during COVID-19 Pandemic
|
|
Journal of Network and Information Security,
2021 |
|
|
[4]
|
A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence
|
|
2020 |
|
|
[5]
|
Teargas, Water Cannons and Twitter: A case study on detecting protest repression events in Turkey 2013.
|
|
2020 |
|
|
[6]
|
Security Investigation on Remote Access Methods of Virtual Private Network
|
|
2020 |
|
|
[7]
|
Investigating the Mediating Role of Organization's Sustainability in The Relationship between Using Greening Technology Information Tools and Organization's …
|
|
2020 |
|
|
[8]
|
Teargas, Water Cannons and Twitter: A case study on detecting protest repression events in Turkey 2013
|
|
Text2story@ ecir,
2020 |
|
|
[9]
|
SAFEST: Secure Actions for FTP Environment with Smart Token
|
|
2019 |
|
|
[10]
|
Comparision of Application Layer Protocol For IoT Via Experimentation
|
|
International Journal of Management, Technology And Engineering,
2019 |
|
|
[11]
|
Securing Wargames System Using Effective Virtual Private Network
|
|
2018 |
|
|
[12]
|
Study on Virtual Private Network (VPN), VPN's Protocols And Security
|
|
2018 |
|
|
[13]
|
Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing
|
|
2018 |
|
|
[14]
|
Managing Cybercrimes Through the Implementation of Security Measures
|
|
Journal of Information Warfare,
2017 |
|
|
[15]
|
ICTN 6885 Dr. John Pickard Spring 2016
|
|
2016 |
|
|
[16]
|
Performance Analysis of Various Protocols on Virtual Private Network for IPSec
|
|
2015 |
|
|
[17]
|
Information Leakage Prevention Using Virtual Disk Drive
|
|
International Journal of Computer Network and …,
2013 |
|
|
[18]
|
Information Leakage Prevention Using Virtual Disk Drive.
|
|
2013 |
|
|
[19]
|
Model of CanReg5 Implementation for Indonesia
|
|
Indonesian Journal of Cancer,
2012 |
|
|
[1]
|
İletişim Teknolojilerinde Veri Güvenliği ve Uzaktan Erişim: VPN Kullanımı Üzerine Bir Vaka Çalışması
Bilgi Yönetimi,
2023
DOI:10.33721/by.1275605
|
|
|
[2]
|
A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence
Multimedia Tools and Applications,
2020
DOI:10.1007/s11042-020-09478-1
|
|
|