Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,726,881 papers from all fields of science
Search
Sign In
Create Free Account
Physical access
Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Access control
Cold boot attack
Computer and network surveillance
Hardware keylogger
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Mapping potential motorised sightseeing recreation supply across broad privately-owned landscapes of the Southern United States
K. Merry
,
P. Bettinger
,
J. Siry
,
J. Bowker
,
S. Weaver
,
Z. Ucar
2018
Corpus ID: 53033473
Abstract The recreational opportunities available across landscapes of the Southern United States can be broad and diverse, and…
Expand
2013
2013
Self-Encrypting Disks pose Self-Decrypting Risks How to break Hardware-based Full Disk Encryption
Tilo Müller
,
Tobias Latzo
,
F. Freiling
,
Friedrich-Alexander
2013
Corpus ID: 53407224
Hardware-based full disk encryption (FDE) drives, such as Intel’s SSD 320 and 520 series, are widely believed to be a fast and…
Expand
2011
2011
Camera auto-calibration using pedestrians and zebra-crossings
Michael Hödlmoser
,
Branislav Micusík
,
M. Kampel
IEEE International Conference on Computer Vision
2011
Corpus ID: 2782064
In this paper we present a novel camera self-calibration technique to automatically recover intrinsic and extrinsic parameters of…
Expand
Review
2009
Review
2009
Veterans with Disabilities in Postsecondary Education.
Joseph W. Madaus
,
W. Miller
,
M. Vance
2009
Corpus ID: 150892813
Over the past 60 years, veterans with disabilities have been a catalyst in the development of services for students with…
Expand
2007
2007
Evaluation and analysis of a face and voice outdoor multi-biometric system
H. Vajaria
,
T. Islam
,
P. Mohanty
,
Sudeep Sarkar
,
R. Sankar
,
R. Kasturi
Pattern Recognition Letters
2007
Corpus ID: 18998889
2001
2001
Remembering how to use the Internet - An investigation into the effectiveness of VoiceHelp for older adults
W. Morrissey
,
M. Zajicek
Interacción
2001
Corpus ID: 22257711
1999
1999
Considerations for an effective telecommunications-use policy
M. Whitman
,
A. Townsend
,
Robert J. Aalberts
Communications of the ACM
1999
Corpus ID: 11853949
information privacy issues, has created a large gray area in organizational policy-making. What exactly should an organization…
Expand
1997
1997
An integrated multicast connection management solution for wired and wireless ATM networks
L. Ngoh
,
Hongyi Li
,
Weiguo Wang
IEEE Communications Magazine
1997
Corpus ID: 12650487
With the prospect of commercializing wireless ATM networks fast becoming a reality, and ATM becoming one of the main network…
Expand
1994
1994
Some Schemes for Restructuring and Mobilising Information in Documents: A Historical Perspective
W. Boyd Rayward
Information Processing & Management
1994
Corpus ID: 36990942
1986
1986
Establishment and maintenance of maternal responsiveness in postpartum Wistar rats
M. Jakubowski
,
J. Terkel
Animal Behaviour
1986
Corpus ID: 53170092
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE