Academic literature on the topic 'NVM Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NVM Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "NVM Security"
Lei, Mengya, Fan Li, Fang Wang, Dan Feng, Xiaomin Zou, and Renzhi Xiao. "SecNVM: An Efficient and Write-Friendly Metadata Crash Consistency Scheme for Secure NVM." ACM Transactions on Architecture and Code Optimization 19, no. 1 (March 31, 2022): 1–26. http://dx.doi.org/10.1145/3488724.
Full textHaywood Dadzie, Thomas, Jiwon Lee, Jihye Kim, and Hyunok Oh. "NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory." Electronics 9, no. 8 (August 13, 2020): 1304. http://dx.doi.org/10.3390/electronics9081304.
Full textBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Full textHuang, Fang-ting, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang, and Yu-kun Zhou. "Enhancing security of NVM-based main memory with dynamic Feistel network mapping." Frontiers of Information Technology & Electronic Engineering 19, no. 7 (July 2018): 847–63. http://dx.doi.org/10.1631/fitee.1601652.
Full textKhan, Mohammad Nasim Imtiaz, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay, and Swaroop Ghosh. "Comprehensive Study of Side-Channel Attack on Emerging Non-Volatile Memories." Journal of Low Power Electronics and Applications 11, no. 4 (September 28, 2021): 38. http://dx.doi.org/10.3390/jlpea11040038.
Full textKhan, Mohammad Nasim Imtiaz, and Swaroop Ghosh. "Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories." Journal of Low Power Electronics and Applications 11, no. 4 (September 24, 2021): 36. http://dx.doi.org/10.3390/jlpea11040036.
Full textZou, Yu, Kazi Abu Zubair, Mazen Alwadi, Rakin Muhammad Shadab, Sanjay Gandham, Amro Awad, and Mingjie Lin. "ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery." ACM Transactions on Embedded Computing Systems 21, no. 1 (January 31, 2022): 1–32. http://dx.doi.org/10.1145/3492735.
Full textHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, and Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology." Networks and Heterogeneous Media 18, no. 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Full textFung, Carol, Jérôme François, Weverton Cordeiro, and Mohamed Faten Zhani. "Advanced security management." International Journal of Network Management 29, no. 3 (May 2019): e2070. http://dx.doi.org/10.1002/nem.2070.
Full textMolina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances." International Journal of Network Management 28, no. 5 (July 16, 2018): e2038. http://dx.doi.org/10.1002/nem.2038.
Full textDissertations / Theses on the topic "NVM Security"
Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Full textGoswami, Pronnoy. "Investigating the Reproducbility of NPM packages." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98491.
Full textMaster of Science
Software packages are distributed as pre-compiled binaries to facilitate software development. There are various package repositories for various programming languages such as NPM (JavaScript), pip (Python), and Maven (Java). Developers install these pre-compiled packages in their projects to implement certain functionality. Additionally, these package repositories allow developers to publish new packages and help the developer community to reduce the delivery time and enhance the quality of the software product. Unfortunately, recent articles have revealed an increasing number of attacks on the package repositories. Moreover, developers trust the pre-compiled binaries, which often contain malicious code. To address this challenge, we conduct our empirical investigation to analyze the reproducibility of NPM packages for the JavaScript ecosystem. Reproducible Builds is a concept that allows any individual to verify the build artifacts by replicating the build process of software packages. For instance, if the developers could verify that the build artifacts of the pre-compiled software packages available in the NPM repository are identical to the ones generated when they individually build that specific package, they could mitigate and be aware of the vulnerabilities in the software packages. The build process is usually described in configuration files such as package.json and DOCKERFILE. We chose the NPM registry for our study because of three primary reasons – (1) it is the largest package repository, (2) JavaScript is the most widely used programming language, and (3) there is no prior dataset or investigation that has been conducted by researchers. We took a two-step approach in our study – (1) dataset collection, and (2) source-code differencing for each pair of software package versions. For the dataset collection phase, we downloaded all available releases/versions of 226 popularly used NPM packages and for the code-differencing phase, we used an off-the-shelf tool called diffoscope. We revealed some interesting findings. Firstly, at least one of the 65 packages as found to be non-reproducible, and these packages have millions of downloads per week. Secondly, we found 50 package-versions to have divergent program semantics which high- lights the potential vulnerabilities in the source-code and improper build practices. Thirdly, we found that the uglification of JavaScript code introduces non-determinism in the build process. Our research sheds light on the challenges of verifying the reproducibility of NPM packages with the current state-of-the-art tools and the need to develop better verification tools in the future. To conclude, we believe that our work is a step towards realizing the reproducibility of NPM packages and making the community aware of the implications of non-reproducible build artifacts.
Silva, Tânia Clemente. "A UE e a segurança internacional: uma nova estratégia de segurança europeia num mundo multicomplexo." Master's thesis, Universidade de Évora, 2018. http://hdl.handle.net/10174/24166.
Full textTran, Thi Thu Nguyet. "Beneficiary status and level of access to social security policies by farmers in the Mekong Delta, Viet Nam." Thesis, Tran, Thi Thu Nguyet (2022) Beneficiary status and level of access to social security policies by farmers in the Mekong Delta, Viet Nam. PhD thesis, Murdoch University, 2022. https://researchrepository.murdoch.edu.au/id/eprint/65144/.
Full textEsteves, Jorge Manuel Gaspar. "Guarda Nacional Republicana: tendências da profissão de oficial num tempo de transição." Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/15732.
Full textMasco, Joseph. "The nuclear borderlands : the legacy of the Manhattan Project in post-Cold War New Mexico /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 1999. http://wwwlib.umi.com/cr/ucsd/fullcit?p9926561.
Full textBa, Hélène Aminatou. "Contribution of contract farming to sustainable value chain upgrading in the Mekong River Delta in Vietnam." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0025.
Full textIn recent years, the structure of the Vietnamese rice sector has changed. From a highly fragmented value chain producing rice for low value-added markets, the shift toward more vertically integrated and coordinated value chains through contract farming has begun to emerge. Contract farming is used as a tool to govern more effectively rice quality and penetrate new and lucrative markets for higher quality rice.Many empirical studies have assessed the role of contract farming in developing economies. Contract farming is perceived as an engine for rural development and a golden opportunity for farmers to have direct access to modern markets, agricultural inputs, credit, and technical support. Worldwide, contract farming adoption is promoted as an institutional innovation. In the Vietnamese rice sector, there is a specific legislation to encourage its diffusion such as the Small Farm Large Field program.This thesis aims at assessing the contribution of contract farming to internalize sustainable production standards in rice value chains. The central assumption of this thesis is that some contract attributes may contribute to improving sustainability. A set of attributes of performance declined in sustainable indicators was selected to test our research hypothesis. The attributes of performance stem from the Sustainable Rice Platform’s principles of sustainable rice production and the existing contract attributes in the Mekong River Delta.In the economic dimension of sustainability, we found that participation in contract farming improves the welfare of rice farmers as farmers selling their paddy using a contract gain, on average, $121 per hectare of paddy more compared to farmers producing outside of a contract. The increase in price is mainly a result of an increase in the selling price (price premium).In the social principle of sustainability, we found that participation in contract farming could improve the welfare of small rice farmers through rent and risk-sharing. Export firms share some of its profits with farmers through a price premium. However, due to the large heterogeneity of contract farming models in the Vietnamese rice sector, not all contract models facilitate risk-sharing. In a marketing contract, farmers bear all the production risks whereas in resource contracts some of the production risks may shift to the export firms. Therefore, resource contracts are more likely to improve equity through risk-sharing between farmers and export firms. Moreover, participation in resource contracts is found to improve farmers’ financial inclusion. Export firms are willing to prefinance farmers under contract. However, the opportunity cost of prefinancing may include the loss of farmers’ autonomy. Evidence from our discrete choice experiment reveals a conflicting interest between farmers and export firms regarding the decision rights in a contract. Last but not least, smallest farmers were excluded from contract farming as firms did not always want to support the transaction costs of dealing with numerous individual farmers. However, our findings suggest that the scale-bias could be successfully relaxed through the Small Farm Large Field program.Finally, in the environmental dimension of sustainability, we examined both firms’ and farmers’ prospective responses to the internalization of sustainability through contract farming using an experimental approach. Farmers are found willing to internalize the environmental dimension of sustainability through contract farming in exchange for a price premium. Export firms are found less likely to implement the GlobalG.A.P./VietGAP or the Pesticide free production standards. The cost of such standard implementation and the lack of institutional support are more likely to justify this outcome
Lukeš, Pavel. "Implementace nových koncových uzlů do firmy a jejich management." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241594.
Full textLourenço, Ana Eliza Port. "O Bonfim na Balança: um estudo sobre ruralidade e saúde por meio da análise do estado nutricional das práticas alimentares e da agricultura num bairro de Petrópolis, Rio de Janeiro." reponame:Repositório Institucional da FIOCRUZ, 2010. https://www.arca.fiocruz.br/handle/icict/2555.
Full textEmbora o meio rural brasileiro inclua populações diversas, como povos indígenas, agricultores familiares, ribeirinhos e quilombolas, os estudos de saúde no Brasil têm considerado rural como mera oposição a urbano , o que gera implicações epidemiológicas e políticas. Esta tese analisa o significado de rural em saúde, por meio de um estudo no bairro Bonfim, Petrópolis, RJ, incluindo pesquisa etnográfica sobre alimentação e agricultura, e um censo (de 523 famílias) sobre nutrição, anemia, hipertensão arterial e segurança alimentar. O Bonfim constitui área geopolítica urbana, embora apresente aspectos rurais, como agricultura familiar, área de reserva ambiental e ecoturismo. O bairro tem três regiões sócio-espaciais com diferentes ocupações do solo, demografia, condições socioeconômicas e, consequentemente, distintos perfis de saúde. A região com situação socioeconômica mais baixa e pouca agricultura apresentou maior prevalência de anemia e de insegurança alimentar. Na região onde a ocupação agrícola predomina, há menor prevalência de obesidade, de hipertensão arterial e de insegurança alimentar. Por exemplo, a prevalência de obesidade foi de 8 por cento entre os homens adultos da região agrícola e de 17 por cento nas outras regiões. A prevalência de obesidade em adultos no estudo foi cerca de duas vezes maior que a prevalência nacional, sendo maior para mulheres (29,1 por cento) que para homens (15,4 por cento). Essas variações no perfil nutricional associam-se ao nível de envolvimento com a agricultura e à preferência por alimentos industrializados. A necessidade de dedicar várias horas ao trabalho agrícola é uma das principais causas para a compra de alimentos em vez de plantar para o consumo familiar. A combinação de métodos deste estudo salienta importantes fontes de variação na experiência rural brasileira, sugerindo repensar o uso de rural em estudos de saúde, de forma a considerar as identidades sociais e o contexto local.
Although what is called “rural Brazil” may include populations as diverse as farmers, indigenous peoples, peasant fishing communities and populations of African ancestry, most health studies in Brazil have considered “rural” as a simple opposition to “urban”. This may interfere in epidemiological analyses and health policies. In this thesis I discuss the meaning of rural in health by presenting information about Bonfim, a community located in a mountainous region of Rio de Janeiro state. The study integrated ethnographic research about diet and agriculture, and a census (of 523 families) about nutrition, anemia, blood pressure and food security. Bonfim is geopolitically an urban area, though it contains rural aspects, such as farmland, parkland and ecotourism services. The community is divided into three socially defined regions, each with different land usage, demography, socioeconomic status and resultant health profiles. In the region where socioeconomic status is lower and farming work is rare, there was a higher prevalence of anemia and food insecurity. In the region where farm work predominates, there was a lower prevalence of obesity, hypertension and food insecurity. For example, in the farming region, 8% of adult men were obese, while in the other regions 17% of adult men were obese. The prevalence of obesity for adults in this study was twice the national prevalence. The prevalence of obesity in adult women was 29%, while in adult men it was 15%. These nutritional profile variations are associated with the level of involvement with agriculture and extent of local preferences for industrialized food. The need to spend long hours working on the farm is one of the main causes for purchasing food rather than growing it for family consumption. This fine-grained mixed-methods research sheds light on important sources of variation in the rural experience in Brazil. It also suggests a reconsideration of the use of the concept of rural in health studies, urging a more accurate accounting of social identities and local contexts.
Mondon, Sylvain. "Une approche par la pratique des relations entre action, organisation et décision en contexte extrême : le cas de la course au large à la voile." Thesis, Paris, HESAM, 2020. http://www.theses.fr/2020HESAC019.
Full textResearch issue is dedicated to the relationships between action, decision and organization in extreme context during performance seeking. These relationships are approached from the point of view of an ongoing action in order to analyze time lags management in decision-making practices in a time perspective of action. Two offshore racing sample are analyzed using an ethnomethodological approach by decision-making practice of the organized activity based on an immersion within the organization during competition. Time lags between the perception of events at stake and their management within the organization are modeled in the form of decision phenomenon. We conclude that, in extreme context, organization’s performance is linked to its ability to implement a decision-making practice consistent with temporal circumstances of the action. This result contributes to a practice theory of organization
Books on the topic "NVM Security"
Verma, Madan Mohan. NAM and security in Asia-Pacific region. New Delhi, India: Indian Institute for Non-Aligned Studies, 1988.
Find full textNam, UNDP Viet, ed. How progressive is social security in Viet Nam? Hanoi: UNDP Viet Nam, 2006.
Find full textWaehner, Joerg. Einstrich-Keinstrich: NVA-Tagebuch. Köln: Kiepenheuer & Witsch, 2006.
Find full textNam-Pukhan kwa kukche chŏngch'i. Kyŏngju-si: Sinji Sŏwŏn, 2011.
Find full textIn'gan anbo wa Nam-Pukhan hyŏmnyŏk. Sŏul: Ak'anet, 2013.
Find full textChʻi-jŏng, Pak, and Kang Sŏk-chʻan, eds. Nam-Pukhan kwa Tongbuga kukche kwanʼgye. Sŏul-si: Kŏnʼguk Taehakkyo Chʻulpʻanbu, 2006.
Find full textHyŏndae kunsa munje wa Nam-Pukhan. Sŏul: Hyŏngsŏl Chʻulpʻansa, 2001.
Find full textKramer, Ellen. Thuật ngữ an sinh xã hội Việt Nam. Hà Nội: Viện khoa học lao động và xã hội, 2011.
Find full textKoós, Anna. A nem kívánt hagyaték. Budapest: Akadémiai Kiadó, 2006.
Find full textPak, Chin. Nam-Pukhan sahoe pojang chedo ŭi pigyo mit tʻonghap panghyang. Sŏul Tʻŭkpyŏlsi: Hanʾguk Kaebal Yŏnʾguwŏn, 1994.
Find full textBook chapters on the topic "NVM Security"
Mulligan, Mark, Arnout van Soesbergen, Caitlin Douglas, and Sophia Burke. "Natural Flood Management in the Thames Basin: Building Evidence for What Will and Will Not Work." In Water Security in a New World, 223–46. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_12.
Full textMulligan, Mark, Sophia Burke, Caitlin Douglas, and Arnout van Soesbergen. "Methodologies to Assess and Map the Biophysical Effectiveness of Nature Based Solutions." In Water Security in a New World, 51–65. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_4.
Full textKaplan, Berkay, and Jingyu Qian. "A Survey on Common Threats in npm and PyPi Registries." In Deployable Machine Learning for Security Defense, 132–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9_6.
Full textMiranda, Lucas, Cainã Figueiredo, Daniel Sadoc Menasché, and Anton Kocheturov. "Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub Pages." In Cyber Security, Cryptology, and Machine Learning, 511–22. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2_36.
Full textHassard, J. F., and S.-R. Sellevåg. "Disinformation in the Deployment and Mitigation of CBRNE Attacks in the Age of New Social Media (NSM)." In Advanced Sciences and Technologies for Security Applications, 209–18. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17374-5_10.
Full textNapaumporn, Bongkot. "Forgotten Stateless Vietnamese in Thailand." In IMISCOE Research Series, 57–74. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25748-3_4.
Full textTakahashi, Ryo. "Property Rights and Natural Resource Management in Developing Countries." In Emerging-Economy State and International Policy Studies, 127–38. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5542-6_10.
Full textEastin, J. "Climate change, livelihoods and domestic violence in Indonesia." In Gender, climate change and livelihoods: vulnerabilities and adaptations, 94–106. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789247053.0008.
Full text"Foreword: NSM/PST." In The City between Freedom and Security, 9–10. Birkhäuser, 2017. http://dx.doi.org/10.1515/9783035607611-002.
Full text"Changing approaches to food security in Viet Nam." In New Challenges to Food Security, 255–71. Routledge, 2014. http://dx.doi.org/10.4324/9780203371176-22.
Full textConference papers on the topic "NVM Security"
Skorobogatov, Sergei. "Compromising device security via NVM controller vulnerability." In 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE). IEEE, 2020. http://dx.doi.org/10.1109/paine49178.2020.9337736.
Full textYang, Chaofei, Beiye Liu, Yandan Wang, Yiran Chen, Hai Li, Xian Zhang, and Guangyu Sun. "The Applications of NVM Technology in Hardware Security." In GLSVLSI '16: Great Lakes Symposium on VLSI 2016. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2902961.2903043.
Full textXu, Jie, Dan Feng, Yu Hua, Fangting Huang, Wen Zhou, Wei Tong, and Jingning Liu. "An Efficient Spare-Line Replacement Scheme to Enhance NVM Security." In DAC '19: The 56th Annual Design Automation Conference 2019. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3316781.3317767.
Full textNagarajan, Karthikeyan, Mohammad Nasim Imtiaz Khan, and Swaroop Ghosh. "ENTT: A Family of Emerging NVM-based Trojan Triggers." In 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2019. http://dx.doi.org/10.1109/hst.2019.8740836.
Full textSun, Zhiwen, Zhiping Jia, Xiaojun Cai, Zhiyong Zhang, and Lei Ju. "AIMR: An Adaptive Page Management Policy for Hybrid Memory Architecture with NVM and DRAM." In 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.179.
Full textDong, Wei, Xin Li, Yanbin Li, Meikang Qiu, Lei Dou, Lei Ju, and Zhiping Jia. "Minimizing Update Bits of NVM-Based Main Memory Using Bit Flipping and Cyclic Shifting." In 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.194.
Full textLeitold, Ferenc, Anna Medve, and Levente Kovacs. "SIP security problems in NGM Services." In The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007). IEEE, 2007. http://dx.doi.org/10.1109/ngmast.2007.4343428.
Full textHogervorst, Maarten A., and Frank L. Kooi. "NVG-the-Day: towards realistic night-vision training." In SPIE Security + Defence, edited by David A. Huckridge and Reinhard Ebert. SPIE, 2014. http://dx.doi.org/10.1117/12.2066700.
Full textToet, Alexander, Frank L. Kooi, Frido Kuijper, and Roland J. M. Smeenk. "Objective assessment of simulated daytime and NVG image fidelity." In Defense and Security, edited by Jacques G. Verly. SPIE, 2005. http://dx.doi.org/10.1117/12.602463.
Full textHammons, Tom, and Zbigniew Styczynski. "Network Security Management (NSM) focused on Dispersed Generation." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596030.
Full textReports on the topic "NVM Security"
Jonassen, Rachael, Mikael Skou Andersen, Jacqueline Cottrell, and Sandeep Bhattacharya. Carbon Pricing and Fossil Fuel Subsidy Rationalization Tool Kit. Asian Development Bank, July 2023. http://dx.doi.org/10.22617/tim230241.
Full textCooperation for Water, Energy, and Food Security in Transboundary Basins under Changing Climate. Vientiane, Lao PDR: Mekong River Commission Secretariat, September 2014. http://dx.doi.org/10.52107/mrc.ajgf87.
Full text