Journal articles on the topic 'Memory security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Memory security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Apryshchenko, V. Yu. "Memory as Security." New Past, no. 3 (2016): 86–108. http://dx.doi.org/10.18522/2500-3224-2016-3-86-108.
Sha, Mo, Yifan Cai, Sheng Wang, Linh Thi Xuan Phan, Feifei Li, and Kian-Lee Tan. "Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures." Proceedings of the ACM on Management of Data 2, no. 3 (May 29, 2024): 1–29. http://dx.doi.org/10.1145/3654958.
Lescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (July 2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Crenne, Jérémie, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, and Deepak Unnikrishnan. "Configurable memory security in embedded systems." ACM Transactions on Embedded Computing Systems 12, no. 3 (March 10, 2013): 1–23. http://dx.doi.org/10.1145/2442116.2442121.
Younan, Yves, Wouter Joosen, Frank Piessens, and Hans Van den Eynden. "Improving Memory Management Security for C and C++." International Journal of Secure Software Engineering 1, no. 2 (April 2010): 57–82. http://dx.doi.org/10.4018/jsse.2010040104.
Lee, Jinjae, Derry Pratama, Minjae Kim, Howon Kim, and Donghyun Kwon. "CoMeT: Configurable Tagged Memory Extension." Sensors 21, no. 22 (November 22, 2021): 7771. http://dx.doi.org/10.3390/s21227771.
Toymentsev, Sergey. "Russia's Historical Memory: Strict-Security or Hybrid?" Ab Imperio 2013, no. 2 (2013): 336–45. http://dx.doi.org/10.1353/imp.2013.0042.
English, Erin. "New PCMCIA card offers security and memory." Computer Fraud & Security Bulletin 1995, no. 3 (March 1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80128-6.
Carboni, Roberto, and Daniele Ielmini. "Stochastic Memory Devices for Security and Computing." Advanced Electronic Materials 5, no. 9 (June 11, 2019): 1900198. http://dx.doi.org/10.1002/aelm.201900198.
Chien, Jason. "Meeting the Memory Challenge." New Electronics 54, no. 15 (October 2021): 18–22. http://dx.doi.org/10.12968/s0047-9624(22)60520-0.
Harum, Dana Putri, Aminudin Aminudin, and Sofyan Arifianto. "Improvisasi algoritma advanced encryption standard (AES) dengan melakukan pemetaan s-box pada modifikasi mixcolumns." Jurnal Repositor 1, no. 2 (December 31, 2019): 95. http://dx.doi.org/10.22219/repositor.v1i2.813.
Tahir, Shahzaib, Hasan Tahir, Ruhma Tahir, Muttukrishnan Rajarajan, and Haider Abbas. "Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint." Electronics 11, no. 5 (March 5, 2022): 818. http://dx.doi.org/10.3390/electronics11050818.
Gordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (February 4, 2021): 7. http://dx.doi.org/10.3390/cryptography5010007.
Yan, Pengbo, and Toby Murray. "SecRSL: security separation logic for C11 release-acquire concurrency." Proceedings of the ACM on Programming Languages 5, OOPSLA (October 20, 2021): 1–26. http://dx.doi.org/10.1145/3485476.
Sepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (February 25, 2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.
Sevastianova, Yaroslava, and Dmitriy Efremenko. "Securitization of memory and dilemma of mnemonic security." Political Science (RU), no. 2 (2020): 66–86. http://dx.doi.org/10.31249/poln/2020.02.03.
Davies, Nigel, Adrian Friday, Sarah Clinch, Corina Sas, Marc Langheinrich, Geoff Ward, and Albrecht Schmidt. "Security and Privacy Implications of Pervasive Memory Augmentation." IEEE Pervasive Computing 14, no. 1 (January 2015): 44–53. http://dx.doi.org/10.1109/mprv.2015.13.
Wang, Xueyan, Jienlei Yang, Yinglin Zhao, Xiaotao Jia, Gang Qu, and Weisheng Zhao. "Hardware Security in Spin-based Computing-in-memory." ACM Journal on Emerging Technologies in Computing Systems 16, no. 4 (October 2, 2020): 1–18. http://dx.doi.org/10.1145/3397513.
Biswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Akdemir, Bayram, and Hasan Üzülmez. "Providing Security of Vital Data for Conventional Microcontroller Applications." Applied Mechanics and Materials 789-790 (September 2015): 1059–66. http://dx.doi.org/10.4028/www.scientific.net/amm.789-790.1059.
Rahman, Nashrullah Mujibur, Didik Tristianto, and Slamet Winardi. "Design and Build Security for Opening and Closing a House Fence using a Microcontroller-Based Remote Control." Natural Sciences Engineering and Technology Journal 1, no. 2 (August 19, 2021): 54–57. http://dx.doi.org/10.37275/nasetjournal.v1i2.10.
Wu, Jin, and Yi Huai Wang. "Protection Mechanisms and Security Operations of XS128 Flash Memory." Advanced Materials Research 403-408 (November 2011): 1767–71. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1767.
Wang, Jian, and Ying Li. "RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection." Information 12, no. 4 (April 14, 2021): 169. http://dx.doi.org/10.3390/info12040169.
Mamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (July 30, 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Jagiełło-Szostak, Anna. "Links between foreign and security policy and historical memory: the case of Serbia – Kosovo relations." Rocznik Instytutu Europy Środkowo-Wschodniej 18, no. 2 (December 2020): 59–84. http://dx.doi.org/10.36874/riesw.2020.2.3.
JIBIN JOY and Dr. S. Devaraju. "AVOIDANCE OF DUPLICACY AND COMPELLING CLOUD SECURITY INDIFFERENT CLOUD SITUATIONS." INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS 11, no. 11 (November 5, 2023): a543—a555. http://dx.doi.org/10.56975/1k890v13.
Alemami, Yahia, Ali M. Al-Ghonmein, Khaldun G. Al-Moghrabi, and Mohamad Afendee Mohamed. "Cloud data security and various cryptographic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (April 1, 2023): 1867. http://dx.doi.org/10.11591/ijece.v13i2.pp1867-1879.
Dener, Murat. "Comparison of Encryption Algorithms in Wireless Sensor Networks." ITM Web of Conferences 22 (2018): 01005. http://dx.doi.org/10.1051/itmconf/20182201005.
Al-Ameen, Mahdi Nasrullah, S. M. Taiabul Haque, and Matthew Wright. "Leveraging autobiographical memory for two-factor online authentication." Information & Computer Security 24, no. 4 (October 10, 2016): 386–99. http://dx.doi.org/10.1108/ics-01-2016-0005.
Gustafsson, Karl. "Memory Politics and Ontological Security in Sino-Japanese Relations." Asian Studies Review 38, no. 1 (November 18, 2013): 71–86. http://dx.doi.org/10.1080/10357823.2013.852156.
Iyengar, Anirudh Srikant, Swaroop Ghosh, and Kenneth Ramclam. "Domain Wall Magnets for Embedded Memory and Hardware Security." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5, no. 1 (March 2015): 40–50. http://dx.doi.org/10.1109/jetcas.2015.2398232.
Pakhomenko, Sergii, and Olga Sarajeva. "Securitization of Memory: a Theoretical Framework to Study the Latvian Case." Przegląd Strategiczny, no. 13 (December 31, 2020): 395–410. http://dx.doi.org/10.14746/ps.2020.1.24.
Mahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (September 1, 2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.
Rimaitė-Beržiūnienė, Viktorija. "Visual Securitization: Commemorating the Partisan War in Lithuanian Foreign and Security Policy." Politologija 106, no. 2 (August 23, 2022): 11–52. http://dx.doi.org/10.15388/polit.2022.106.1.
Gustafsson, Karl. "International reconciliation on the Internet? Ontological security, attribution and the construction of war memory narratives in Wikipedia." International Relations 34, no. 1 (July 18, 2019): 3–24. http://dx.doi.org/10.1177/0047117819864410.
Elamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (March 25, 2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.
Alshannaq, Osama, Mohd Rizuan Baharon, Jamil Abedalrahim Jamil Alsayaydeh, Montaser B. A. Hammouda, Khalid Hammouda, Mohammad Mahmoud Nawafleh, and A. I. A. Rahman. "Analysis of the Lowest Memory Consumption (Memory Usage) Through Running Different Cryptography Techniques for Different Types of Images." Journal of Physics: Conference Series 2319, no. 1 (August 1, 2022): 012027. http://dx.doi.org/10.1088/1742-6596/2319/1/012027.
Sujihelen, L., Rajasekhar Boddu, S. Murugaveni, Ms Arnika, Anandakumar Haldorai, Pundru Chandra Shaker Reddy, Suili Feng, and Jiayin Qin. "Node Replication Attack Detection in Distributed Wireless Sensor Networks." Wireless Communications and Mobile Computing 2022 (May 31, 2022): 1–11. http://dx.doi.org/10.1155/2022/7252791.
Li, Sijia, Zhiyi Liao, Zhengyang Wu, Zheng Wu, and Lin Ding. "(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher." Symmetry 14, no. 6 (May 30, 2022): 1127. http://dx.doi.org/10.3390/sym14061127.
Stark, Samuel W., A. Theodore Markettos, and Simon W. Moore. "How Flexible is CXL's Memory Protection?" Queue 21, no. 3 (June 23, 2023): 54–64. http://dx.doi.org/10.1145/3606014.
Stavrakakis, Dimitrios, Dimitra Giantsidi, Maurice Bailleu, Philip Sändig, Shady Issa, and Pramod Bhatotia. "Anchor: A Library for Building Secure Persistent Memory Systems." Proceedings of the ACM on Management of Data 1, no. 4 (December 8, 2023): 1–31. http://dx.doi.org/10.1145/3626718.
Zhou, Xianzhong, and Ying Wang. "Enhancing the security of memory in cloud infrastructure through in‐phase change memory data randomisation." IET Computers & Digital Techniques 15, no. 5 (March 31, 2021): 321–34. http://dx.doi.org/10.1049/cdt2.12023.
S. Sujitha, Et al. "Improved Rsa Algorithm for Data Security against DDoS Attack in a Cloud-based Intrusion Detection System." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2162–65. http://dx.doi.org/10.17762/ijritcc.v11i9.9218.
Cutinha, Jaden. "SOFTWARE SYSTEMS SECURITY IMPLICATION UTILIZING THE BELL-LAPADULA MODEL." International Journal of Social Science and Economic Research 08, no. 01 (2023): 177–82. http://dx.doi.org/10.46609/ijsser.2023.v08i01.012.
Peroumal, Vijayakumar, Rajashree R, Anusha Kulkarni, and Prachi Thakur. "FPGA Implementation of Secure Block Creation Algorithm for Blockchain Technology." ECS Transactions 107, no. 1 (April 24, 2022): 5519–31. http://dx.doi.org/10.1149/10701.5519ecst.
Haywood Dadzie, Thomas, Jiwon Lee, Jihye Kim, and Hyunok Oh. "NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory." Electronics 9, no. 8 (August 13, 2020): 1304. http://dx.doi.org/10.3390/electronics9081304.
Krasivskyy, Orest, and Nadiia Pidberezhnyk. "Cultural Security of Ukraine." Przegląd Strategiczny, no. 14 (December 29, 2021): 471–88. http://dx.doi.org/10.14746/ps.2021.1.27.
Márquez, Erika. "Colombia’s Gallery of Memory." Latin American Perspectives 43, no. 5 (July 9, 2016): 78–98. http://dx.doi.org/10.1177/0094582x16655306.
Chen, Yuanyuan, Jing Chen, and Mingzhu Li. "Numerical Modeling of A New Virtual Trajectory Password Architecture." Journal of Physics: Conference Series 2068, no. 1 (October 1, 2021): 012013. http://dx.doi.org/10.1088/1742-6596/2068/1/012013.
Stępniewski, Tomasz. "Russia-Ukraine war: independence, identity, and security." Rocznik Instytutu Europy Środkowo-Wschodniej 20, no. 2 (December 2022): 7–16. http://dx.doi.org/10.36874/riesw.2022.2.1.