Works matching DE "COMPUTER access control software"
1
- Defense Acquisition, 2024, v. 53, n. 300, p. 4
- ASHCOM, EMILY;
- TYREE, BENJAMIN
- Article
2
- Mathematical Structures in Computer Science, 2013, v. 23, n. 4, p. 796, doi. 10.1017/S0960129512000266
- KUHLMANN, MIRCO;
- SOHR, KARSTEN;
- GOGOLLA, MARTIN
- Article
3
- Future Internet, 2020, v. 12, n. 1, p. 15, doi. 10.3390/fi12010015
- Wu, Zhijun;
- Zhang, Yun;
- Xu, Enzhong
- Article
4
- Annals of DAAAM & Proceedings, 2019, v. 30, p. 1160, doi. 10.2507/30th.daaam.proceedings.163
- Eprikov, Stanislav;
- Kim, Valery;
- Pryanichnikov, Valentin;
- Prysev, Eugene;
- Punenkov, Oleg
- Article
5
- Información Tecnológica, 2021, v. 32, n. 5, p. 57, doi. 10.4067/S0718-07642021000500057
- Páez, Jaime A.;
- Cortes, Jairo A.;
- Simanca, Fredys A.;
- Blanco, Fabián
- Article
6
- Mobile Networks & Applications, 2020, v. 25, n. 3, p. 1162, doi. 10.1007/s11036-019-01435-z
- Fei, Yuan;
- Zhu, Huibiao;
- Vinh, Phan Cong
- Article
7
- International Journal of Public Administration, 1991, v. 14, n. 2, p. 193, doi. 10.1080/01900699108524713
- Article
8
- Applied Sciences (2076-3417), 2022, v. 12, n. 4, p. 2014, doi. 10.3390/app12042014
- Choi, Eu-teum;
- Kim, Tae-hyung;
- Jun, Yong-Kee;
- Lee, Seongjin;
- Han, Mingyun
- Article
9
- Journal of Algebraic Statistics, 2022, v. 13, n. 2, p. 1707
- Sonavane, Sonali Mahendra;
- G. R., Prashantha;
- Nikam, Pranjali Deepak
- Article
10
- InfoM, 2013, n. 45, p. 34
- Trninić, Branislav;
- Sladić, Goran;
- Milosavljević, Gordana
- Article
11
- Sustainability (2071-1050), 2020, v. 12, n. 9, p. 3885, doi. 10.3390/su12093885
- Munoz-Arcentales, Andres;
- López-Pernas, Sonsoles;
- Pozo, Alejandro;
- Alonso, Álvaro;
- Salvachúa, Joaquín;
- Huecas, Gabriel
- Article
12
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 9/10, p. 1703, doi. 10.1142/S0218194015710035
- Pereira, Óscar Mortágua;
- Regateiro, Diogo Domingues;
- Aguiar, Rui L.
- Article
13
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 9/10, p. 1709, doi. 10.1142/S0218194015710047
- Pei, Xin;
- Yu, Huiqun;
- Fan, Guisheng
- Article
14
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 9/10, p. 1551, doi. 10.1142/S021819401540032X
- Xu, Dianxiang;
- Shen, Ning;
- Zhang, Yunpeng
- Article
15
- EURASIP Journal on Information Security, 2015, v. 2015, p. 1, doi. 10.1186/s13635-015-0022-z
- Raghavendra, R.;
- Busch, Christoph
- Article
16
- Computing, 2019, v. 101, n. 9, p. 1307, doi. 10.1007/s00607-018-0655-0
- Reaz, Rezwana;
- Acharya, H. B.;
- Elmallah, Ehab S.;
- Cobb, Jorge A.;
- Gouda, Mohamed G.
- Article
17
- ISeCure, 2021, v. 13, n. 2, p. 117, doi. 10.22042/isecure.2021.254089.580
- Hadavi, Mohammad Ali;
- Bagherdaei, Arash;
- Ghasemi, Simin
- Article
18
- ISeCure, 2020, v. 12, n. 2, p. 126
- Zarezadeh, Maryam;
- Taluki, Maede Ashouri;
- Siavashi, Mohammad
- Article
19
- DAAAM International Scientific Book, 2014, p. 423, doi. 10.2507/daaam.scibook.2014.34
- MIHAI, DORU.;
- MUDURA, RADU.;
- TEODORESCU, RAZVAN;
- ILINCA, LIVIU
- Article
20
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2014, v. 29, n. 4, p. 707, doi. 10.17341/gummfd.18495
- ERDEM, O. Ayhan;
- KOCAOĞLU, Ramazan
- Article
22
- Electronics (2079-9292), 2019, v. 8, n. 6, p. 715, doi. 10.3390/electronics8060715
- Guan, Zheng;
- Jia, Yao;
- He, Min
- Article
23
- Journal of Network & Systems Management, 2018, v. 26, n. 1, p. 147, doi. 10.1007/s10922-017-9411-6
- Oktian, Yustus Eko;
- Lee, Sang-Gon;
- Lam, JunHuy
- Article
24
- Electronics Letters (Wiley-Blackwell), 2015, v. 51, n. 6, p. 532, doi. 10.1049/el.2014.3135
- Xiaoying Chang;
- Kai Liu;
- Feng Liu
- Article
25
- 2017
- Question & Answer
26
- Computer Journal, 2014, v. 57, n. 2, p. 217, doi. 10.1093/comjnl/bxs168
- Lee, Hong-Chang;
- Park, Jong-Eun;
- Lee, Myung-Joon
- Article
27
- ETRI Journal, 2013, v. 35, n. 1, p. 58, doi. 10.4218/etrij.13.0111.0725
- Qi Yang;
- Yuxiang Zhuang;
- Jianghong Shi
- Article
28
- Discrete Dynamics in Nature & Society, 2016, p. 1, doi. 10.1155/2016/2437615
- Yu, Yang;
- Shi, Jie;
- He, Ke;
- Han, Peng
- Article
29
- International Journal of Electronic Commerce Studies, 2013, v. 4, n. 2, p. 281, doi. 10.7903/ijecs.1039
- Buehrer, Daniel J.;
- Tzu-Yang Wang
- Article
30
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 10, p. 154
- Tamil Selvan, M.;
- Nanthini, G.;
- Newlin Rajkumar, M.
- Article
31
- New Perspectives on Healthcare Risk Management, Control & Governance, 2015, v. 34, n. 1, p. 28
- Article
32
- International Review on Computers & Software, 2013, v. 8, n. 7, p. 1613
- Manikandan, R.;
- Selvakumar, K.
- Article
33
- International Review on Computers & Software, 2012, v. 7, n. 4, p. 1518
- Mirabi, Meghdad;
- Ibrahim, Hamidah;
- Udzir, Nur Izura;
- Mamat, Ali
- Article
34
- International Review on Computers & Software, 2012, v. 7, n. 4, p. 1419
- Sreedevi, M.;
- Seshadri, R.
- Article
35
- Sensors (14248220), 2021, v. 21, n. 13, p. 4253, doi. 10.3390/s21134253
- Ghazal, Rubina;
- Malik, Ahmad Kamran;
- Raza, Basit;
- Qadeer, Nauman;
- Qamar, Nafees;
- Bhatia, Sajal
- Article
36
- Sensors (14248220), 2020, v. 20, n. 9, p. 2464, doi. 10.3390/s20092464
- Kayes, A. S. M.;
- Kalaria, Rudri;
- Sarker, Iqbal H.;
- Islam, Md. Saiful;
- Watters, Paul A.;
- Ng, Alex;
- Hammoudeh, Mohammad;
- Badsha, Shahriar;
- Kumara, Indika
- Article
37
- Peace & Conflict Monitor, 2020, p. 1
- Article
38
- IT: Information Technology, 2013, v. 55, n. 6, p. 239, doi. 10.1524/itit.2013.2004
- Article
39
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 1, p. 1, doi. 10.1109/TDSC.2014.2309126
- Zhong, Yuhui;
- Bhargava, Bharat;
- Lu, Yi;
- Angin, Pelin
- Article
40
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 1, p. 71, doi. 10.1109/TDSC.2014.2309117
- Harika, Pullamsetty;
- Nagajyothi, Marreddy;
- John, John C.;
- Sural, Shamik;
- Vaidya, Jaideep;
- Atluri, Vijayalakshmi
- Article
41
- International Journal of Online Engineering, 2013, p. 47, doi. 10.3991/ijoe.v9iS8.3381
- Neto, R. B.;
- Fernandes, H.;
- Pereira, T.;
- Borges, I.;
- Amarante-Segundo, G.;
- Balula, S.;
- Figueiredo, R.;
- Pereira, J. P.
- Article
42
- Behavior Research Methods, 2022, v. 54, n. 2, p. 864, doi. 10.3758/s13428-021-01650-1
- Tjuka, Annika;
- Forkel, Robert;
- List, Johann-Mattis
- Article
43
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 247
- SADIKIN RIFKI;
- YOUNGHO PARK;
- SANGJAE MOON
- Article
44
- Journal of Supercomputing, 2020, v. 76, n. 8, p. 6040, doi. 10.1007/s11227-019-03119-7
- Mythili, R.;
- Venkataraman, Revathi;
- Sai Raj, T.
- Article
45
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 3, p. 280, doi. 10.22266/ijies2019.0630.27
- Michael, Auxilia;
- Kothandaraman, Raja;
- Kaliyan, Kannan
- Article
46
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2323, doi. 10.1002/sec.1494
- Sánchez-Carmona, Adrián;
- Robles, Sergi;
- Borrego, Carlos
- Article
47
- Telkomnika, 2019, v. 17, n. 1, p. 275, doi. 10.12928/TELKOMNIKA.v17i1.11613
- Awangga, Rolly Maulana;
- Pane, Syafrial Fachri;
- Dwi Astuti, Restiyana
- Article
48
- Journal of Healthcare Engineering, 2020, p. 1, doi. 10.1155/2020/5601068
- Moura, Pedro;
- Fazendeiro, Paulo;
- Inácio, Pedro R. M.;
- Vieira-Marques, Pedro;
- Ferreira, Ana
- Article
49
- BMC Public Health, 2024, v. 24, n. 1, p. 1, doi. 10.1186/s12889-024-17690-z
- Marsh, Samantha;
- Chu, Joanna Ting Wai;
- Calder, Amanda Jane
- Article
50
- LogForum, 2017, v. 13, n. 1, p. 91, doi. 10.17270/J.LOG.2017.1.8
- Nowicki, Tadeusz;
- Kiedrowicz, Maciej;
- Waszkowski, Robert;
- Chodowska, Agata;
- Lach, Agnieszka
- Article