Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,367,932 papers from all fields of science
Search
Sign In
Create Free Account
Physical access
Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Access control
Cold boot attack
Computer and network surveillance
Hardware keylogger
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Between virtual and real: exploring hybrid interaction and communication in virtual worlds
Athanasios Christopoulos
,
M. Conrad
,
Mitul Shukla
International Journal of Social Media and…
2016
Corpus ID: 207423340
In this paper we aim to explore the potential advantages of interactions on student engagement and provide guidance to educators…
Expand
2015
2015
Security Analysis of Consumer-Grade Anti-Theft Solutions Provided by Android Mobile Anti-Virus
Laurent Simon
2015
Corpus ID: 11828572
We study the “anti-theft” mechanisms available to consumers to thwart unauthorised access to personal data on stolen Android…
Expand
2013
2013
Self-Encrypting Disks pose Self-Decrypting Risks How to break Hardware-based Full Disk Encryption
Tilo Müller
,
Tobias Latzo
,
F. Freiling
,
Friedrich-Alexander
2013
Corpus ID: 53407224
Hardware-based full disk encryption (FDE) drives, such as Intel’s SSD 320 and 520 series, are widely believed to be a fast and…
Expand
2011
2011
Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database
Malek Al-Zewairi
,
Ja'far Alqatawna
,
Omar Sultan Al-Kadi
IEEE Jordan Conference on Applied Electrical…
2011
Corpus ID: 16215402
Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies…
Expand
2010
2010
Downward Dividends of Groundwater Irrigation in Hard Rock Areas of Southern Peninsular India
Anantha
2010
Corpus ID: 58922724
An important input for sustainable agricultural development in hard rock areas is access to groundwater irrigation. In hard rock…
Expand
2009
2009
On building secure SCADA systems using security patterns
E. Fernández
,
Jie Wu
,
Maria Mercedes Larrondo-Petrie
,
Yifeng Shao
Cyber Security and Information Intelligence…
2009
Corpus ID: 11219641
Critical infrastructure systems are important systems that support our daily lives. Protecting these systems is attracting…
Expand
2004
2004
Guidance of magnetic intraocular microrobots by active defocused tracking
K. B. Yesin
,
Karl Vollmers
,
B. Nelson
IEEE/RJS International Conference on Intelligent…
2004
Corpus ID: 17082516
Current laparoscopic techniques for intraocular surgery require that the vitreous humor is removed and at least three cannulas…
Expand
2001
2001
Remembering how to use the Internet - An investigation into the effectiveness of VoiceHelp for older adults
W. Morrissey
,
M. Zajicek
Interacción
2001
Corpus ID: 22257711
1997
1997
An integrated multicast connection management solution for wired and wireless ATM networks
L. Ngoh
,
Hongyi Li
,
Weiguo Wang
IEEE Communications Magazine
1997
Corpus ID: 12650487
With the prospect of commercializing wireless ATM networks fast becoming a reality, and ATM becoming one of the main network…
Expand
1984
1984
Hardware Requirements for Secure Computer Systems: A Framework
C. Landwehr
,
John Millar Carroll
IEEE Symposium on Security and Privacy
1984
Corpus ID: 7513538
This report develops a new set of criteria for evaluating computer architectures that are to support systems with security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE