Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,035,437 papers from all fields of science
Search
Sign In
Create Free Account
External storage
In computing, external storage comprises devices that temporarily store information for transporting from computer to computer. Such devices are not…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Array data structure
Auxiliary memory
Blackshades
Blu-ray
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Mobile devices - the most hostile environment for security?
Jason Rouse
Network Security
2012
Corpus ID: 28082801
2012
2012
Dependable and secure computing in medical information systems
Junbeom Hur
,
Kyungtae Kang
Computer Communications
2012
Corpus ID: 30109940
2008
2008
Web Performance Enhancement of E-business System Using the SSD
Daesik Ko
,
Seung-Kook Cheong
Second International Conference on Future…
2008
Corpus ID: 14179472
In this paper, we proposed web performance enhancement of the e-business system using the SSD (Solid State Drive). In the e…
Expand
2006
2006
Event sequence mining to develop profiles for computer forensic investigation purposes
Tamas Abraham
Australasian Computer Science Week
2006
Corpus ID: 14602342
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations…
Expand
2006
2006
Magnets-a next generation access network
R. Karrer
,
Petros Zerfos
,
N. Piratla
2006
Corpus ID: 15604295
Magnets is a next-generation wireless infrastructure consisting of a wireless mesh with 50 nodes, and a highspeed wireless…
Expand
2005
2005
Incorporating a secure coprocessor in the database-as-a-service model
Einar Mykletun
,
G. Tsudik
International Workshop on Information Assurance
2005
Corpus ID: 1212134
In this paper, we suggest an extension to the database-as-a-service (DAS) model that introduces a secure coprocessor (SC) at an…
Expand
2005
2005
The role of key loggers in computer-based assessment forensics
R. Laubscher
,
M. Olivier
,
H. Venter
,
J. Eloff
,
D. Rabe
2005
Corpus ID: 62449582
When conducting a computer-based assessment in an educational environment, several infringements of assessment regulations could…
Expand
1983
1983
File Management Techniques
Billy G. Claybrook
1983
Corpus ID: 59774052
1973
1973
The Computer – Central Units
E. Coles
1973
Corpus ID: 60174657
1972
1972
Automatic Generation of Texture Feature Detectors
J. Read
,
S. N. Jayaramamurthy
IEEE transactions on computers
1972
Corpus ID: 28435324
This correspondence is an informal exposition on a method of pattern recognition recently introduced by McCormick and Michalski…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE