Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,006,874 papers from all fields of science
Search
Sign In
Create Free Account
Tempest (codename)
Known as:
Emission security
, Emissions security
, Tempest attack
Expand
TEMPEST is a National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
8b/10b encoding
Air gap (networking)
Analog signal
Cathode ray tube
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Challenges and success factors for large-scale agile transformations: A systematic literature review
Kim-Karol Dikert
,
M. Paasivaara
,
C. Lassenius
Journal of Systems and Software
2016
Corpus ID: 26960161
Review
2015
Review
2015
Crime Places in Crime Theory
J. Eck
,
D. Weisburd
2015
Corpus ID: 2813288
Criminologists and crime prevention practitioners are increasingly aware of the importance of places of crime. A place is a very…
Expand
Highly Cited
2015
Highly Cited
2015
Units of Analysis in Geographic Criminology: Historical Development, Critical Issues and Open Questions
D. Weisburd
,
G. Bruinsma
,
W. Bernasco
2015
Corpus ID: 52257423
Social scientists have had a long and enduring interest in the geography of crime and the explanation of variation of crime at…
Expand
Highly Cited
2014
Highly Cited
2014
An Automatic Kurtosis‐Based P ‐ and S ‐Phase Picker Designed for Local Seismic Networks
C. Baillard
,
W. Crawford
,
V. Ballu
,
C. Hibert
,
A. Mangeney
2014
Corpus ID: 14961134
Abstract We present an automatic P ‐ and S ‐wave onset‐picking algorithm, using kurtosis‐derived characteristic functions (CF…
Expand
Review
2012
Review
2012
Introducing the UCDP Non-State Conflict Dataset
Ralph Sundberg
,
Kristine Eck
,
Joakim Kreutz
2012
Corpus ID: 73596583
This article extends the Uppsala Conflict Data Program (UCDP) by presenting new global data on non-state conflict, or armed…
Expand
Highly Cited
2011
Highly Cited
2011
Comparative System Analysis of Direct Steam Generation and Synthetic Oil Parabolic Trough Power Plants With Integrated Thermal Storage
J. Feldhoff
,
K. Schmitz
,
+4 authors
J. Schulte-Fischedick
2011
Corpus ID: 55992016
Abstract Parabolic trough power plants are currently the most commercially applied systems for CSP power generation. To improve…
Expand
Highly Cited
2005
Highly Cited
2005
Compromising Emanations
M. Kuhn
Encyclopedia of Cryptography and Security
2005
Corpus ID: 18311811
Electronic equipment can emit unintentional signals from which eavesdroppers may reconstruct processed data at some distance…
Expand
Highly Cited
2003
Highly Cited
2003
Learning Precise Timing with LSTM Recurrent Networks
Felix Alexander Gers
,
N. Schraudolph
,
J. Schmidhuber
Journal of machine learning research
2003
Corpus ID: 474078
The temporal distance between events conveys information essential for numerous sequential tasks such as motor control and rhythm…
Expand
Highly Cited
2003
Highly Cited
2003
Extreme flooding events on the Rhine and the survival and distribution of riparian plant species
P. Vervuren
,
C. Blom
,
H. de Kroon
2003
Corpus ID: 33636835
1 Summer floods whose severity is affected by flooding duration, submergence depth and underwater light availability, have a…
Expand
Highly Cited
1991
Highly Cited
1991
What's worth fighting for?: Working together for your school
M. Fullan
,
A. Hargreaves
1991
Corpus ID: 150754509
Two challenges that face educators--developing interactive professionalism in the schools, and facilitating teacrc!rs and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE