Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,798,537 papers from all fields of science
Search
Sign In
Create Free Account
Security and Maintenance
Known as:
Security centre
, Windows Security Center
, Windows Health Center
Expand
Security and Maintenance (formerly Action Center and Windows Security Center) is a monitoring component of the Windows NT family of operating system…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Application programming interface
Backup and Restore
Device driver
Features new to Windows 7
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Spatiotemporal patterns induced by Turing and Turing-Hopf bifurcations in a predator-prey system
Mengxin Chen
,
R. Wu
,
Liping Chen
Applied Mathematics and Computation
2020
Corpus ID: 218799129
2019
2019
An Internet-Wide View of Self-Revealing Honeypots
Shunichiro Morishita
,
Takuya Hoizumi
,
+5 authors
Tsutomu Matsumoto
2019
Corpus ID: 85442719
Open-source honeypots are a vital component in the protection of networks and the observation of trends in the threat landscape…
Expand
2016
2016
An online security protocol for NFC payment: Formally analyzed by the scyther tool
Nour El Madhoun
,
F. Guenane
,
G. Pujolle
Second International Conference on Mobile and…
2016
Corpus ID: 12214798
Nowadays, NFC technology is integrated into bank cards, smartphones and sales point terminals in order to immediately execute…
Expand
2015
2015
A Novel Distributed Intrusion Detection System for Vehicular Ad Hoc Networks
L. Maglaras
2015
Corpus ID: 16412170
In the new interconnected world, we need to secure vehicular cyber-physical systems (VCPS) using sophisticated intrusion…
Expand
Highly Cited
2015
Highly Cited
2015
Superorganism resilience: eusociality and susceptibility of ecosystem service providing insects to stressors
L. Straub
,
Geoffrey R. Williams
,
J. Pettis
,
I. Fries
,
P. Neumann
2015
Corpus ID: 55485007
2014
2014
Real-Time Intruder Detection System Using Sound Localization and Background Subtraction
H. S. Amaresh
,
Y. Rao
,
Rohini S. Hallikar
Texas Instruments India Educators' Conference…
2014
Corpus ID: 40850317
In this paper, an efficient and real-time intruder detection system, based on the concepts of sound localization and background…
Expand
Highly Cited
2013
Highly Cited
2013
Cloud computing-based forensic analysis for collaborative network security management system
Zhen Chen
,
Fuye Han
,
Junwei Cao
,
Xin Jiang
,
Shuo Chen
2013
Corpus ID: 14363239
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing…
Expand
2011
2011
Monitoring workers through wearable transceivers for improving work safety
Levent Senyurek
,
Köksal Hocaoğlu
,
B. Sezer
,
O. Urhan
IEEE International Symposium on Intelligent…
2011
Corpus ID: 22077647
In this paper we present a wireless monitoring system for increasing work safety of people working alone. The main component of…
Expand
Review
2009
Review
2009
Microbiological quality and metal levels in wells and boreholes water in some peri-urban communities in Kumasi, Ghana
K. Obiri-Danso
,
B. Adjei
,
K. Stanley
,
K. Jones
2009
Corpus ID: 130362907
Many communities in Kumasi, Ghana, are increasingly dependent on boreholes and hand dug wells. The aim of this study was to…
Expand
2007
2007
Searching surveillance video
A. Hampapur
,
L. Brown
,
+5 authors
M. Lu
IEEE Conference on Advanced Video and Signal…
2007
Corpus ID: 7946235
Surveillance video is used in two key modes, watching for known threats in real-time and searching for events of interest after…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE