Works matching DE "ACCESS control for information networks"
1
- Personal & Ubiquitous Computing, 2011, v. 15, n. 8, p. 811, doi. 10.1007/s00779-011-0367-3
- Samek, Hannadi;
- Fleury, Martin;
- Ghanbari, Mohammed
- Article
2
- Journal of Computing & Security, 2023, v. 10, n. 2, p. 1, doi. 10.22108/JCS.2023.136750.1120
- Nazerian, Fatemeh;
- Motameni, Homayun
- Article
3
- International Journal of Network Management, 2016, v. 26, n. 6, p. 492, doi. 10.1002/nem.1946
- Ashok Kumar, A. R.;
- Rao, S. V.;
- Goswami, Diganta
- Article
4
- International Journal of Pure & Applied Sciences & Technology, 2015, v. 29, n. 1, p. 1
- Dzarma, Daniel Ezra;
- Jibasen, Danjuma
- Article
5
- Romanian Review Precision Mechanics, Optics & Mecatronics, 2014, n. 45, p. 137
- Article
6
- Electrotechnical Review / Elektrotehniski Vestnik, 2018, v. 85, n. 3, p. 95
- Ratkoceri, Jakup;
- Batagelj, Boštjan;
- Humar, Iztok
- Article
7
- Information Technology & Control, 2018, v. 47, n. 3, p. 393, doi. 10.5755/j01.itc.47.3.20330
- Boucherit, Ammar;
- Castro, Laura M.;
- Khababa, Abdallah;
- Hasan, Osman
- Article
8
- Journal of Science & Technology MSU, 2016, v. 35, n. 2, p. 251
- สุวรรณษา, อรรถพล;
- พ่วงพรพิทักษ์, สมนึก
- Article
9
- ISeCure, 2018, v. 10, n. 2, p. 129
- Soltani, Naeimeh;
- Bohlooli, Ramin;
- Jalili, Rasool
- Article
10
- Wireless Networks (10220038), 2019, v. 25, n. 3, p. 1017, doi. 10.1007/s11276-017-1651-6
- Umar, Idris Abubakar;
- Hanapi, Zurina Mohd;
- Sali, A.;
- Zulkarnain, Zuriati A.
- Article
11
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2575, doi. 10.1007/s11277-016-3938-9
- Lee, Jae-Hyoung;
- Cho, Sung
- Article
12
- American Journal of Health-System Pharmacy, 2008, v. 65, n. 22, p. 2086, doi. 10.2146/news080090
- Article
13
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2804, doi. 10.1002/sec.910
- Fotiou, N.;
- Trossen, D.;
- Marias, G.F.;
- Kostopoulos, A.;
- Polyzos, G.C.
- Article
14
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1510, doi. 10.1002/sec.756
- Kim, Iluk;
- Seo, Jungtaek;
- Shon, Taeshik;
- Moon, Jongsub
- Article
15
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1528, doi. 10.1002/sec.695
- Kim, Jin-Mook;
- Jeong, Hwa-Young;
- Hong, Bong-Hwa
- Article
16
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1552, doi. 10.1002/sec.768
- Li, Xiangxue;
- Qian, Haifeng;
- Yu, Yu;
- Weng, Jian;
- Wang, Ziping
- Article
17
- Powder Diffraction, 2014, v. 29, n. S2, p. S42, doi. 10.1017/S0885715614001092
- Kaminsky, Werner;
- Snyder, Trevor;
- Stone-Sundberg, Jennifer;
- Moeck, Peter
- Article
18
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 8, p. 3862, doi. 10.3837/tiis.2017.08.006
- Xing Hu;
- Linhua Ma;
- Shaocheng Huang;
- Jinke Huang;
- Kangning Sun;
- Tianyu Huang
- Article
19
- Communications of the Association for Information Systems, 2015, v. 36, p. 337
- Salisbury, W. David;
- Ferratt, Thomas W.;
- Wynn Jr., Donald
- Article