Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Network Access Control

Known as: NAC 
Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Design is fundamental to software development but can be demanding to perform. Thus, to assist the software designer… Expand
  • table I
  • table II
  • table III
  • figure 2
  • figure 3
Is this relevant?
2012
2012
Signal transduction of pytohormones under abiotic stresses.- Cross-talks on phytohormones signaling pathways under optimal and… Expand
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 2.1
  • figure 2.2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The existence of online social networks that include person specific information creates interesting opportunities for various… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The existence of on-line social networks that include person specific information creates interesting opportunities for various… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2009
2009
Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2009
Highly Cited
2009
NAM, ATAF, and CUC2 (NAC) proteins are encoded by one of the largest plant-specific transcription factor gene families. The… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Network access control mechanisms constitute an increasingly needed service, when communications are becoming more and more… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
The increasing use of Internet access networks raises the demand for secure and reliable communication for both users and… Expand
  • figure 2.1
  • figure 2.2
  • figure 3.1
  • figure 3.2
  • figure 3.3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Restricting network access of routing and packet forwarding to well-behaving nodes and denying access from misbehaving nodes are… Expand
  • figure 2
  • figure 1
  • table 1
  • table 4
  • table 2
Is this relevant?