Search Results - "Computer access control"
-
1
Authors: Hartman, Wesley
Source: Journal of Accountancy. Sep2025, Vol. 240 Issue 3, p57-62. 5p.
-
2
Authors:
Source: Sensors (14248220). Oct2025, Vol. 25 Issue 19, p6118. 25p.
Subject Terms: *CLOUD computing, *COMPUTER access control, *LEGAL compliance, *INTERNET security, *INTERNET of things, *CRYPTOGRAPHY
-
3
Authors: et al.
Source: Information. Sep2025, Vol. 16 Issue 9, p802. 23p.
-
4
Authors: et al.
Source: Information. Aug2025, Vol. 16 Issue 8, p667. 27p.
-
5
Authors:
Source: Future Internet. Jul2025, Vol. 17 Issue 7, p313. 35p.
Subject Terms: *Internet of things, *Computer access control, *Access control, Trust, Security management, Futurologists
-
6
Authors: YEE, ALAINA (AUTHOR)
Source: PCWorld. Nov2025, Vol. 43 Issue 11, p102-103. 2p. 4 Color Photographs.
Subject Terms: *COMPUTER access control, PASSWORD software
Company/Entity: MICROSOFT Corp. 081466849 MSFT
-
7
Authors:
Source: Computer Networks. Oct2025, Vol. 270, pN.PAG-N.PAG. 1p.
Subject Terms: *5G networks, *COMPUTER access control, TELEMETRY
-
8
Authors: et al.
Source: Navigation (Institute of Navigation). Spring2025, Vol. 72 Issue 1, p1-33. 33p.
Subject Terms: *RADIO (Medium), *COMPUTER access control, *SHIP traffic control, *ELECTRONIC navigation, *QUANTUM cryptography
-
9
Alternate Title: مراجعة الأدبيات حول نماذج التحكم في الوصول في معمارية البرمجيات.
Authors:
Source: Al-Rafadain Engineering Journal. Mar2025, Vol. 30 Issue 1, p71-90. 20p.
Subject Terms: *COMPUTER access control software, *SOFTWARE architecture, *INTERNET of things, *MACHINE learning, *CLOUD computing, *ACCESS control
-
10
Authors:
Source: Discover Internet of Things; 11/18/2025, Vol. 5 Issue 1, p1-17, 17p
-
11
Authors: et al.
Source: Cybersecurity (2523-3246); 11/13/2025, Vol. 8 Issue 1, p1-14, 14p
Subject Terms: ERROR-correcting codes, BIOMETRY, FACE perception, DYNAMICAL systems, COMPUTER access control, DATA protection
-
12
Authors:
Source: Procedia Computer Science. 2025, Vol. 270, p3934-3942. 9p.
-
13
Authors: et al.
Source: Procedia Computer Science. 2025, Vol. 270, p572-581. 10p.
-
14
Authors:
Source: Discover Applied Sciences; Nov2025, Vol. 7 Issue 11, p1-25, 25p
-
15
Authors:
Source: Journal of Science & Technology (1607-2073); 2025, Vol. 30 Issue 7, p100-106, 7p
-
16
Authors: et al.
Source: Information Security Journal: A Global Perspective; 2025, Vol. 34 Issue 6, p633-654, 22p
Subject Terms: MULTI-factor authentication, BIOMETRIC identification, BLUETOOTH technology, NEAR field communication, COMPUTER access control, PHISHING, SECURITY management
Reviews & Products: ANDROID (Operating system)
-
17
Authors:
Source: Discover Artificial Intelligence; 10/21/2025, Vol. 5 Issue 1, p1-19, 19p
Subject Terms: ACCESS control, COMPUTER access control, MACHINE learning, INFORMATION technology
-
18
Authors:
Source: Applied Science, Computing & Energy; 2025, Vol. 3 Issue 2, p224-238, 15p
Subject Terms: INTERNET protocols, BLOCKCHAINS, EMAIL, DATA encryption, COMPUTER access control, CRYPTOGRAPHY
-
19
Authors: Maayah, Mohammed
Source: Journal of Cyber Security & Risk Auditing; 2025, Vol. 2025 Issue 4, p238-256, 19p
Subject Terms: INTERNET security, CLOUD computing, COMPUTER access control, COMPUTER simulation, LINEAR systems
-
20
Authors:
Source: Journal of Cyber Security & Risk Auditing; 2025, Vol. 2025 Issue 4, p222-237, 16p
Subject Terms: INTERNET of things, COMPUTER access control, BLOCKCHAINS, DATA encryption, COMPUTER security
Full Text Finder
Nájsť tento článok vo Web of Science