Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,566 papers from all fields of science
Search
Sign In
Create Free Account
Physical security
Known as:
Security (disambiguation)
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Access control
Artificial intelligence for video surveillance
Atomic authorization
Biometric device
Expand
Broader (1)
Security engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Confronting the One-Man Wolf Pack: Adapting Law Enforcement and Prosecution Responses to the Threat of Lone Wolf Terrorism
B. D. Barnes
2012
Corpus ID: 145335388
In recent years, a new type of terrorist threat has emerged: the "lone wolf." Lone Wolves present a challenge for current law…
Expand
2011
2011
Disasters will happen - are you ready?
J. Oberg
,
Andrew G. Whitt
,
R. M. Mills
IEEE Communications Magazine
2011
Corpus ID: 20546816
This article describes the important considerations and critical steps necessary to develop and maintain a credible disaster…
Expand
2010
2010
Operator-based over-the-air M2M wireless sensor network security
Sachin Agarwal
,
Christoph Peylo
,
Ravishankar Borgaonkar
,
Jean-Pierre Seifert
International Conference on Intelligence in Next…
2010
Corpus ID: 15620409
We describe a novel method for over-the-air automated authentication and verification of machine-to-machine (M2M) wireless sensor…
Expand
Review
2010
Review
2010
Trusted Wireless Sensor Node Platform
Y. M. Yussoff
,
H. Hashim
World Congress on Engineering
2010
Corpus ID: 13960162
A bstract— Security problems related to Wireless Sensor Networks (WSN) has directly influenced the credibility of WSN…
Expand
2005
2005
Quantitative assessment of probabilistic measures for proliferation resistance
M. Yue
,
L. Cheng
,
R. Bari
2005
Corpus ID: 62708743
An evaluation methodology for proliferation resistance (PR) and physical protection (PP) is under development by a PR&PP Experts…
Expand
2000
2000
Practical Private Information Retrieval with Secure Coprocessors
Sean W. Smith
,
D. Safford
2000
Corpus ID: 59851737
What does it take to implement a server that provides access to records in a large database, in a way that ensures that the this…
Expand
2000
2000
A conceptual architecture for real-time intrusion monitoring
S. Furnell
,
P. Dowland
Information Management & Computer Security
2000
Corpus ID: 14744619
The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue…
Expand
1999
1999
CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor
E. Mosanya
,
C. Teuscher
,
H. F. Restrepo
,
P. Galley
,
E. Sanchez
Workshop on Cryptographic Hardware and Embedded…
1999
Corpus ID: 5776857
The CryptoBooster is a modular and reconfigurable cryptographic coprocessor that takes full advantage of current high-performance…
Expand
1994
1994
Controlling multiple security robots in a warehouse environment
H. Everett
,
G. Gilbreath
,
T. A. Heath-Pastore
,
R. Laird
1994
Corpus ID: 17135917
Abstract : The Naval Command Control and Ocean Surveillance Center (NCCOSC) has developed an architecture to provide coordinated…
Expand
Highly Cited
1987
Highly Cited
1987
Physical Security for the μABYSS System
Steve H. Weingart
IEEE Symposium on Security and Privacy
1987
Corpus ID: 14824345
Open systems, now common in many small computers, have given the user logical access to all parts of his or her system. At the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE