Journal articles on the topic 'Computer networks – Access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks – Access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (October 31, 2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.
Full textSlabyshev, Mykhailo O., and Anatolij G. Berdnikov. "Model of control access process in wireless computer network." 47, no. 47 (September 28, 2020): 72–79. http://dx.doi.org/10.26565/2304-6201-2020-47-06.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (August 1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.
Full textKim, Dae-Young, Dae-sik Ko, and Seokhoon Kim. "Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6195024.
Full textNour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–35. http://dx.doi.org/10.1145/3442150.
Full textAlicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (November 8, 2021): 283. http://dx.doi.org/10.3390/fi13110283.
Full textHabib, Ibrahim W., and Tarek N. Saadawi. "Access flow control algorithms in broadband networks." Computer Communications 15, no. 5 (June 1992): 326–32. http://dx.doi.org/10.1016/0140-3664(92)90093-t.
Full textAli, Muneeb, Umar Saif, Adam Dunkels, Thiemo Voigt, Kay Römer, Koen Langendoen, Joseph Polastre, and Zartash Afzal Uzmi. "Medium access control issues in sensor networks." ACM SIGCOMM Computer Communication Review 36, no. 2 (April 28, 2006): 33–36. http://dx.doi.org/10.1145/1129582.1129592.
Full textHarikrishnan, Harshini, Aarjish Sarkar, Shams Al Ajrawi, Albena Mihovska, and Christopher Paolini. "Medium Access Control Protocols for Brain Computer Interface Applications." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 2 (April 2021): 24–41. http://dx.doi.org/10.4018/ijitn.2021040103.
Full textShan, Fangfang, Hui Li, Fenghua Li, Yunchuan Guo, and Ben Niu. "HAC: Hybrid Access Control for Online Social Networks." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/7384194.
Full textUhl, Tadeusz, and Bruno Müller-Clostermann. "Performance analysis of a new network access flow control method in computer communication networks." European Transactions on Telecommunications 1, no. 3 (May 1990): 247–55. http://dx.doi.org/10.1002/ett.4460010304.
Full textZhang, Yixuan, Jingsha He, Bin Zhao, Zhiqing Huang, and Ruohong Liu. "Towards more pro-active access control in computer systems and networks." Computers & Security 49 (March 2015): 132–46. http://dx.doi.org/10.1016/j.cose.2014.12.001.
Full textTong, Liyun, Yang Liu, Yuanyuan Li, Jianquan Lu, Zhen Wang, and Fuad E. Alsaadi. "Robust Control Invariance of Probabilistic Boolean Control Networks via Event-Triggered Control." IEEE Access 6 (2018): 37767–74. http://dx.doi.org/10.1109/access.2018.2828128.
Full textOpaska, Walter P. "Access Control Systems for Personal Computers." EDPACS 14, no. 2 (August 1986): 6–8. http://dx.doi.org/10.1080/07366988609450362.
Full textMalomsoky, Szabolcs, Sándor Rácz, and Szilveszter Nádas. "Connection admission control in UMTS radio access networks." Computer Communications 26, no. 17 (November 2003): 2011–23. http://dx.doi.org/10.1016/s0140-3664(03)00165-8.
Full textJiang, Lurong, Qiaoyu Xu, Hangyi Pan, Yanyun Dai, and Jijun Tong. "Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism." Security and Communication Networks 2020 (November 20, 2020): 1–11. http://dx.doi.org/10.1155/2020/6513920.
Full textZhu, Yun, Jiade Li, Qiuyuan Huang, and Dapeng Wu. "Game Theoretic Approach for Network Access Control in Heterogeneous Networks." IEEE Transactions on Vehicular Technology 67, no. 10 (October 2018): 9856–66. http://dx.doi.org/10.1109/tvt.2018.2856752.
Full textYuen, C., and P. Marbach. "Price-based rate control in random access networks." IEEE/ACM Transactions on Networking 13, no. 5 (October 2005): 1027–40. http://dx.doi.org/10.1109/tnet.2005.858448.
Full textSihotang, Bil Klinton, Sumarno Sumarno, and Bahrudi Efendi Damanik. "Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 229. http://dx.doi.org/10.30865/jurikom.v7i2.2010.
Full textPencheva, Evelina, and Ivaylo Atanasov. "Open Access to Control on Quality of Service in Convergent Networks." International Journal of Information Technology and Web Engineering 5, no. 2 (April 2010): 53–74. http://dx.doi.org/10.4018/jitwe.2010040104.
Full textJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textZhu, Sencun, Shouhuai Xu, Sanjeev Setia, and Sushil Jajodia. "LHAP: A lightweight network access control protocol for ad hoc networks." Ad Hoc Networks 4, no. 5 (September 2006): 567–85. http://dx.doi.org/10.1016/j.adhoc.2005.06.002.
Full textGoodwin, M., and K. J. McDonell. "Access control for network directory systems." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 282–89. http://dx.doi.org/10.1145/1013812.18204.
Full textSivalingam, Krishna M., Kalyani Bogineni, and Patrick W. Dowd. "Pre-allocation media access control protocols for multiple access WDM photonic networks." ACM SIGCOMM Computer Communication Review 22, no. 4 (October 1992): 235–46. http://dx.doi.org/10.1145/144191.144289.
Full textLin, Lin, Shiyong Zhu, Yang Liu, Zhen Wang, and Fuad E. Alsaadi. "Output Regulation of Boolean Control Networks With Nonuniform Sampled-Data Control." IEEE Access 7 (2019): 50691–96. http://dx.doi.org/10.1109/access.2019.2910593.
Full textMasadeh, Ala'eddin, Haythem Bany Salameh, and Ahmad Abu-El-Haija. "Design and Simulation of Spectrum Access and Power Management Protocol for Dynamic Access Networks." International Arab Journal of Information Technology 17, no. 4A (July 31, 2020): 588–97. http://dx.doi.org/10.34028/iajit/17/4a/2.
Full textJoshi, J. B. D. "Access-control language for multidomain environments." IEEE Internet Computing 8, no. 6 (November 2004): 40–50. http://dx.doi.org/10.1109/mic.2004.53.
Full textJha, Satish, Mohammad Rashid, Vijay Bhargava, and Charles Despins. "Medium access control in distributed cognitive radio networks." IEEE Wireless Communications 18, no. 4 (August 2011): 41–51. http://dx.doi.org/10.1109/mwc.2011.5999763.
Full textWang, Qi, Xi Cheng, Qingshan Wang, Peng Liu, and Bin Deng. "A Delay-Constrained Network Coding Algorithm Based on Power Control in Wireless Networks." IEEE Access 6 (2018): 62224–33. http://dx.doi.org/10.1109/access.2018.2873449.
Full textWang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (May 2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.
Full textWang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (November 2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.
Full textGallo, Pierluigi, Katarzyna Kosek-Szott, Szymon Szott, and Ilenia Tinnirello. "CADWAN: A Control Architecture for Dense WiFi Access Networks." IEEE Communications Magazine 56, no. 1 (January 2018): 194–201. http://dx.doi.org/10.1109/mcom.2017.1601097.
Full textDAS, ASHOK KUMAR, SANTANU CHATTERJEE, and JAMUNA KANTA SING. "A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS." International Journal of Foundations of Computer Science 24, no. 05 (August 2013): 625–53. http://dx.doi.org/10.1142/s0129054113500214.
Full textUddin, Md Forkan, Catherine Rosenberg, Weihua Zhuang, Patrick Mitran, and Andre Girard. "Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks." IEEE/ACM Transactions on Networking 22, no. 1 (February 2014): 80–93. http://dx.doi.org/10.1109/tnet.2013.2243163.
Full textMohammadani, Khalid Hussain, Kamran Ali Memon, Imran Memon, Nazish Nawaz Hussaini, and Hadiqua Fazal. "Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092162. http://dx.doi.org/10.1177/1550147720921624.
Full textAlam, Md Khorshed, Azrina Abd Aziz, Suhaimi Abd Latif, and Azniza Abd Aziz. "Error-Control Truncated SVD Technique for In-Network Data Compression in Wireless Sensor Networks." IEEE Access 9 (2021): 13829–44. http://dx.doi.org/10.1109/access.2021.3051978.
Full textTroia, Sebastian, Andres Felipe Rodriguez Vanegas, Ligia Maria Moreira Zorello, and Guido Maier. "Admission Control and Virtual Network Embedding in 5G Networks: A Deep Reinforcement-Learning Approach." IEEE Access 10 (2022): 15860–75. http://dx.doi.org/10.1109/access.2022.3148703.
Full textWang, Jianfeng, Hongqiang Zhai, Pan Li, Yuguang Fang, and Dapeng Wu. "Directional medium access control for ad hoc networks." Wireless Networks 15, no. 8 (February 12, 2008): 1059–73. http://dx.doi.org/10.1007/s11276-008-0102-9.
Full textLiu, Donggang. "Efficient and distributed access control for sensor networks." Wireless Networks 16, no. 8 (March 19, 2010): 2151–67. http://dx.doi.org/10.1007/s11276-010-0249-z.
Full textCheng, Ho Ting, Hai Jiang, and Weihua Zhuang. "Distributed medium access control for wireless mesh networks." Wireless Communications and Mobile Computing 6, no. 6 (2006): 845–64. http://dx.doi.org/10.1002/wcm.445.
Full textLeng, Supeng, Huirong Fu, Qing Wang, and Yan Zhang. "Medium access control in vehicular ad hoc networks." Wireless Communications and Mobile Computing 11, no. 7 (October 30, 2009): 796–812. http://dx.doi.org/10.1002/wcm.869.
Full textLi, Na, Yue Zhao, Ning Hu, and Jing Teng. "Disruption-Free Load Balancing for Aerial Access Network." Wireless Communications and Mobile Computing 2021 (May 23, 2021): 1–15. http://dx.doi.org/10.1155/2021/9926619.
Full textJaber, Zaid Hashim, Dheyaa Jasim Kadhim, and Ahmed Sabah Al-Araji. "Medium access control protocol design for wireless communications and networks review." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (April 1, 2022): 1711. http://dx.doi.org/10.11591/ijece.v12i2.pp1711-1723.
Full textMa Rui, Liu Yancheng, and Wang Chuan. "An Improved Medium Access Control Protocol for Wireless Sensor Networks." International Journal of Advancements in Computing Technology 5, no. 6 (March 31, 2013): 1161–69. http://dx.doi.org/10.4156/ijact.vol5.issue6.136.
Full textShu, Yantai, Huifang Feng, Hua Wang, and Maode Ma. "Dynamic admission control in hybrid QoS networks with WiFi access." Science in China Series F: Information Sciences 49, no. 4 (August 2006): 409–20. http://dx.doi.org/10.1007/s11432-006-2002-x.
Full textCarminati, Barbara, and Elena Ferrari. "Access control and privacy in web‐based social networks." International Journal of Web Information Systems 4, no. 4 (November 21, 2008): 395–415. http://dx.doi.org/10.1108/17440080810919468.
Full textSamuel, Arjmand, Arif Ghafoor, and Elisa Bertino. "Context-Aware Adaptation of Access-Control Policies." IEEE Internet Computing 12, no. 1 (January 2008): 51–54. http://dx.doi.org/10.1109/mic.2008.6.
Full textIslam, Salekul, and J. William Atwood. "Multicast receiver access control by IGMP-AC." Computer Networks 53, no. 7 (May 2009): 989–1013. http://dx.doi.org/10.1016/j.comnet.2008.12.005.
Full textShunan Ma, Jingsha He, Feng Gao, and Yuqiang Zhang. "Access Control Model based on Trust." International Journal of Digital Content Technology and its Applications 5, no. 7 (July 31, 2011): 320–25. http://dx.doi.org/10.4156/jdcta.vol5.issue7.40.
Full text