Journal articles on the topic 'NVM Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NVM Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lei, Mengya, Fan Li, Fang Wang, Dan Feng, Xiaomin Zou, and Renzhi Xiao. "SecNVM: An Efficient and Write-Friendly Metadata Crash Consistency Scheme for Secure NVM." ACM Transactions on Architecture and Code Optimization 19, no. 1 (March 31, 2022): 1–26. http://dx.doi.org/10.1145/3488724.
Full textHaywood Dadzie, Thomas, Jiwon Lee, Jihye Kim, and Hyunok Oh. "NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory." Electronics 9, no. 8 (August 13, 2020): 1304. http://dx.doi.org/10.3390/electronics9081304.
Full textBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Full textHuang, Fang-ting, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang, and Yu-kun Zhou. "Enhancing security of NVM-based main memory with dynamic Feistel network mapping." Frontiers of Information Technology & Electronic Engineering 19, no. 7 (July 2018): 847–63. http://dx.doi.org/10.1631/fitee.1601652.
Full textKhan, Mohammad Nasim Imtiaz, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay, and Swaroop Ghosh. "Comprehensive Study of Side-Channel Attack on Emerging Non-Volatile Memories." Journal of Low Power Electronics and Applications 11, no. 4 (September 28, 2021): 38. http://dx.doi.org/10.3390/jlpea11040038.
Full textKhan, Mohammad Nasim Imtiaz, and Swaroop Ghosh. "Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories." Journal of Low Power Electronics and Applications 11, no. 4 (September 24, 2021): 36. http://dx.doi.org/10.3390/jlpea11040036.
Full textZou, Yu, Kazi Abu Zubair, Mazen Alwadi, Rakin Muhammad Shadab, Sanjay Gandham, Amro Awad, and Mingjie Lin. "ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery." ACM Transactions on Embedded Computing Systems 21, no. 1 (January 31, 2022): 1–32. http://dx.doi.org/10.1145/3492735.
Full textHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, and Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology." Networks and Heterogeneous Media 18, no. 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Full textFung, Carol, Jérôme François, Weverton Cordeiro, and Mohamed Faten Zhani. "Advanced security management." International Journal of Network Management 29, no. 3 (May 2019): e2070. http://dx.doi.org/10.1002/nem.2070.
Full textMolina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances." International Journal of Network Management 28, no. 5 (July 16, 2018): e2038. http://dx.doi.org/10.1002/nem.2038.
Full textRöpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (November 11, 2015): 6–24. http://dx.doi.org/10.1002/nem.1918.
Full textBanes, David. "Security and the Enterprise Network." International Journal of Network Management 5, no. 4 (July 1995): 198–206. http://dx.doi.org/10.1002/nem.4560050408.
Full textOnyango, Calvin, Susan Karenya Luvitaa, Kibet Lagat, Alexandra Hüsken, Inga Smit, and Marcus Schmidt. "Utilisation of Amaranth and Finger Millet as Ingredients in Wheat Dough and Bread for Increased Agro-Food Biodiversity." Foods 11, no. 7 (March 22, 2022): 911. http://dx.doi.org/10.3390/foods11070911.
Full textHeld, Gilbert. "Focus on the CyberAngel security program." International Journal of Network Management 14, no. 3 (May 2004): 213–19. http://dx.doi.org/10.1002/nem.522.
Full textBakry, Saad Haj. "Development of security policies for private networks." International Journal of Network Management 13, no. 3 (2003): 203–10. http://dx.doi.org/10.1002/nem.472.
Full textCastonguay, Julie, and Els Sol. "Benchmarking as NPM Instrument in Activating Social Security Policies." European Journal of Social Security 12, no. 4 (December 2010): 324–42. http://dx.doi.org/10.1177/138826271001200405.
Full textLiu, Jie, Xiaojun Tong, Zhu Wang, Jing Ma, and Longteng Yi. "An Improved Rao–Nam Cryptosystem Based on Fractional Order Hyperchaotic System and EDF–QC–LDPC." International Journal of Bifurcation and Chaos 29, no. 09 (August 2019): 1950122. http://dx.doi.org/10.1142/s0218127419501220.
Full textSiahaan, R. Fanry, Preddy Marpaung, Ibnu Febrian, and Widia Putri. "Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia." Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) 22, no. 2 (August 11, 2023): 348. http://dx.doi.org/10.53513/jis.v22i2.8773.
Full textWilliams, Ruth. "Data security." Nursing Management 23, no. 5 (September 2016): 10. http://dx.doi.org/10.7748/nm.23.5.10.s14.
Full textFarooqi, Farkhanda I. "The Inequities of the Supplemental Security Income Program." Professional Case Management 25, no. 5 (September 2020): 291–96. http://dx.doi.org/10.1097/ncm.0000000000000460.
Full textKropiwiec, Cássio Ditzel, Edgard Jamhour, Manoel Camillo Penna, and Guy Pujolle. "Multi-constraint security policies for delegated firewall administration." International Journal of Network Management 21, no. 6 (February 11, 2011): 469–93. http://dx.doi.org/10.1002/nem.774.
Full textRoss, Steven J. "Is It Security or Disaster Recovery? Who Cares?" International Journal of Network Management 5, no. 4 (July 1995): 193–97. http://dx.doi.org/10.1002/nem.4560050407.
Full textCline, Gregory P. "Internet Firewall Servers Address Burning Corporate Security Issues." International Journal of Network Management 5, no. 4 (July 1995): 230–32. http://dx.doi.org/10.1002/nem.4560050412.
Full textUrien, Pascal, and Guy Pujolle. "Security and privacy for the next wireless generation." International Journal of Network Management 18, no. 2 (March 2008): 129–45. http://dx.doi.org/10.1002/nem.678.
Full textNechay, A. A., and P. E. Kotikov. "Control of information security." Scientific Bulletin, no. 2 (2014): 86–92. http://dx.doi.org/10.17117/nv.2014.02.086.
Full textFung, Carol, Mohamed Faten Zhani, Weverton Cordeiro, and Jérôme François. "Special issue on security for emerging open networking technologies." International Journal of Network Management 28, no. 1 (October 9, 2017): e2010. http://dx.doi.org/10.1002/nem.2010.
Full textChao, Han-Chieh, T. Y. Wu, and Jiann-Liang Chen. "Security-enhanced packet video with dynamic multicast throughput adjustment." International Journal of Network Management 11, no. 3 (2001): 147–59. http://dx.doi.org/10.1002/nem.398.
Full textHima, Gabriella. "BIZTONSÁG ÉRTÉKE ÉS ÁRA." Economica 9, no. 2 (August 21, 2020): 1–6. http://dx.doi.org/10.47282/economica/2018/9/2/4128.
Full textHima, Gabriella. "BIZTONSÁG ÉRTÉKE ÉS ÁRA." Economica 9, no. 2 (August 21, 2020): 1–6. http://dx.doi.org/10.47282/economica/2018/9/2/4128.
Full textBartos, Karel, and Martin Rehak. "IFS: Intelligent flow sampling for network security-an adaptive approach." International Journal of Network Management 25, no. 5 (July 7, 2015): 263–82. http://dx.doi.org/10.1002/nem.1902.
Full textKaur, Rajbir, Navroop Kaur, and Sandeep K. Sood. "Security in IoT network based on stochastic game net model." International Journal of Network Management 27, no. 4 (May 8, 2017): e1975. http://dx.doi.org/10.1002/nem.1975.
Full textPeterson, Dale G. "A new era in data network security: Protocol-sensitive encryption." International Journal of Network Management 5, no. 4 (July 1995): 214–18. http://dx.doi.org/10.1002/nem.4560050410.
Full textHeld, Gilbert. "Focus on the Asanté FriendlyNet VR2004 Series VPN Security Router." International Journal of Network Management 13, no. 6 (November 2003): 427–32. http://dx.doi.org/10.1002/nem.498.
Full textHuy, Hà Triệu. "POLITICAL AND SECURITY COOPERATION BETWEEN VIETNAM AND ASEAN (2007-2021): ACHIEVEMENTS AND PROSPECTS." Tạp chí Khoa học 19, no. 1 (February 10, 2022): 1. http://dx.doi.org/10.54607/hcmue.js.19.1.3346(2022).
Full textHoang, Thi Tue Phuong. "Protection for Trafficked Persons in Viet Nam: Another National Security Discourse?" International Migration 53, no. 4 (February 6, 2015): 25–36. http://dx.doi.org/10.1111/imig.12189.
Full textDabbebi, Oussema, Remi Badonnel, and Olivier Festor. "Leveraging countermeasures as a service for VoIP security in the cloud." International Journal of Network Management 24, no. 1 (December 25, 2013): 70–84. http://dx.doi.org/10.1002/nem.1853.
Full textKao, Shang-Juh, and Lai-Ming Shiue. "Security management of mutually trusted domains through cooperation of defensive technologies." International Journal of Network Management 19, no. 3 (May 2009): 183–201. http://dx.doi.org/10.1002/nem.697.
Full textSmith, Libby, and John Morck. "The North Carolina Department of Commerce: A Healthy Workforce Promotes Economic Security." North Carolina Medical Journal 73, no. 4 (July 2012): 278–80. http://dx.doi.org/10.18043/ncm.73.4.278.
Full textHoy, Mariea Grubbs, and Joseph Phelps. "Online privacy and security practices of the 100 largest US nonprofit organizations." International Journal of Nonprofit and Voluntary Sector Marketing 14, no. 1 (February 2009): 71–82. http://dx.doi.org/10.1002/nvsm.344.
Full textPandey, Divya, and Vandana Kushwaha. "The use of Analytical Hierarchy Process in sensor-based networks for security-aware congestion control." Networks and Heterogeneous Media 18, no. 1 (2022): 244–74. http://dx.doi.org/10.3934/nhm.2023009.
Full textRistov, Pančo, Ante Mrvica, and Pavao Komadina. "Security of Data and Information in Vessel Traffic Management Information Systems." Naše more 63, no. 1 (March 2016): 1–8. http://dx.doi.org/10.17818/nm/2016/1.7.
Full textŽURGA, VIDA. "NOVA SODOBNA GROŽNJA NACIONALNI VARNOSTI – PRORAČUNSKA GROŽNJA." REPUBLIKA SLOVENIJA – PRVIH SAMOSTOJNIH PETINDVAJSET LET V MEDNARODNEM VARNOSTNEM OKOLJU/ REPUBLIC OF SLOVENIA – THE FIRST TWENTY-FIVE YEARS OF INDEPENDENCE IN THE INTERNATIONAL SECURITY ENVIRONMENT, VOLUME 2016/ ISSUE 18/4 (October 30, 2016): 35–50. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.18.4.2.
Full textPham Ngoc NHAN and Le Tran Thanh Liem. "Plant Diversity And Food Security At Households In Mekong Delta – Viet Nam." ISPEC Journal of Agricultural Sciences 5, no. 4 (December 12, 2021): 965–76. http://dx.doi.org/10.46291/ispecjasvol5iss4pp965-976.
Full textPham Minh Dat et al.,, Pham Minh Dat et al ,. "Management, IT Security and Risk Management Issues in Viet Nam Tourism Industry." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 1463–70. http://dx.doi.org/10.24247/ijmperdjun2020130.
Full textRist, Carl. "Wealth and Health: Exploring Asset Poverty as a Key Measure of Financial Security." North Carolina Medical Journal 83, no. 1 (January 2022): 11–16. http://dx.doi.org/10.18043/ncm.83.1.11.
Full textSperotto, A., R. Hofstede, A. Dainotti, C. Schmitt, and G. Dreo Rodosek. "Special issue on measure, detect and mitigate-challenges and trends in network security." International Journal of Network Management 25, no. 5 (September 2015): 261–62. http://dx.doi.org/10.1002/nem.1905.
Full textAbdullah Marich Ali, Abdullah Marich Ali. "Network Security Management Using Ontology-Based Mobile Agents." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (January 12, 2012): 25–44. http://dx.doi.org/10.4197/comp.1-2.2.
Full textSaleem, Munazza, and Omar Masood. "Credit Risk Management Can Gear Up Bank Performance – Moderating Effect of Interest Rate in Developed Countries." iRASD Journal of Economics 5, no. 1 (March 25, 2023): 720–38. http://dx.doi.org/10.52131/joe.2023.0501.0111.
Full textSaleh, Mohammad Saad, Abdullah Alrabiah, and Saad Haj Bakry. "Using ISO 17799: 2005 information security management: a STOPE view with six sigma approach." International Journal of Network Management 17, no. 1 (June 5, 2006): 85–97. http://dx.doi.org/10.1002/nem.616.
Full textBeasley, Sarah. "Deliberate self harm in medium security." Nursing Management 6, no. 8 (December 1, 1999): 29–33. http://dx.doi.org/10.7748/nm.6.8.29.s18.
Full text