Journal articles on the topic 'Software and hardware security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software and hardware security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gilmont, T., J. D. Legat, and J. J. Quisquater. "Hardware security for software privacy support." Electronics Letters 35, no. 24 (1999): 2096. http://dx.doi.org/10.1049/el:19991424.
Full textLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." Auto Tech Review 4, no. 12 (December 2015): 24–27. http://dx.doi.org/10.1365/s40112-015-1050-2.
Full textLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." ATZelektronik worldwide 10, no. 3 (May 30, 2015): 34–37. http://dx.doi.org/10.1007/s38314-015-0522-0.
Full textSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Full textMACHER*, Georg, Harald SPORER, Eugen BRENNER, and Christian KREINER. "Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition." Journal of Ubiquitous Systems and Pervasive Networks 10, no. 1 (March 7, 2018): 1–9. http://dx.doi.org/10.5383/juspn.10.01.001.
Full textGranado-Criado, José M., Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, and Juan A. Gómez-Pulido. "Hardware security platform for multicast communications." Journal of Systems Architecture 60, no. 1 (January 2014): 11–21. http://dx.doi.org/10.1016/j.sysarc.2013.11.007.
Full textKonikiewicz, Wojciech, and Marcin Markowski. "Analysis of Performance and Efficiency of Hardware and Software Firewalls." Journal of Applied Computer Science Methods 9, no. 1 (June 1, 2017): 49–63. http://dx.doi.org/10.1515/jacsm-2017-0003.
Full textKitsos, P., N. Sklavos, K. Papadomanolakis, and O. Koufopavlou. "Hardware implementation of bluetooth security." IEEE Pervasive Computing 2, no. 1 (January 2003): 21–29. http://dx.doi.org/10.1109/mprv.2003.1186722.
Full textDadashzadeh, Mohammad. "Choosing IT Platforms In The Age Of Stuxnet." Journal of Cybersecurity Research (JCR) 2, no. 1 (December 1, 2017): 17–26. http://dx.doi.org/10.19030/jcr.v2i1.10076.
Full textZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Full textГорлов, Алексей, Aleksey Gorlov, Михаил Рытов, Mikhail Rytov, Дмитрий Лысов, and Dmitriy Lysov. "AUTOMATED SYSTEM FOR ESTIMATION-EFFICIENCYSOFTWARE MEANS OF IN-FORMATION PROTECTION." Automation and modeling in design and management of 2019, no. 2 (June 23, 2019): 25–32. http://dx.doi.org/10.30987/article_5cf2d22c9dcd72.20436206.
Full textXiaoying Liang. "Information System Security Design Using Hardware/Software Co-design Technology." International Journal of Digital Content Technology and its Applications 6, no. 8 (May 31, 2012): 351–60. http://dx.doi.org/10.4156/jdcta.vol6.issue8.41.
Full textTomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (December 1, 2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Full textMathew, Jimson, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang, and Dhiraj K. Pradhan. "A Novel Memristor-Based Hardware Security Primitive." ACM Transactions on Embedded Computing Systems 14, no. 3 (May 21, 2015): 1–20. http://dx.doi.org/10.1145/2736285.
Full textLavrischeva, Ekaterina Mikhailovna, and Sergey Vadimovich Zelenov. "Model-Based Approach to Ensuring Reliability and Security of Web-services." Proceedings of the Institute for System Programming of the RAS 32, no. 5 (2020): 153–66. http://dx.doi.org/10.15514/ispras-2020-32(5)-12.
Full textNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGPLAN Notices 43, no. 3 (March 25, 2008): 308–18. http://dx.doi.org/10.1145/1353536.1346321.
Full textDesnitsky, V., and A. Meleshko. "SECURITY ANALYSIS OF SOFTWARE AND HARDWARE COMPONENTS IN WIRELESS SENSOR NETWORKS." Telecom IT 7, no. 1 (2019): 75–83. http://dx.doi.org/10.31854/2307-1303-2019-7-1-75-83.
Full textWang, Li Nan. "Research on Data Security of Finance Software." Applied Mechanics and Materials 380-384 (August 2013): 2494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2494.
Full textAzuaje, Rafael. "Securing IoT: Hardware Vs Software." Journal of Advances in Information Technology 9, no. 3 (2018): 79–83. http://dx.doi.org/10.12720/jait.9.3.79-83.
Full textBiernacki, Lauren, Mark Gallagher, Zhixing Xu, Misiker Tadesse Aga, Austin Harris, Shijia Wei, Mohit Tiwari, Baris Kasikci, Sharad Malik, and Todd Austin. "Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (August 2021): 1–38. http://dx.doi.org/10.1145/3456299.
Full textStiles, Doug. "The Hardware Security Behind Azure Sphere." IEEE Micro 39, no. 2 (March 1, 2019): 20–28. http://dx.doi.org/10.1109/mm.2019.2898633.
Full textDrzevitzky, Stephanie, Uwe Kastens, and Marco Platzner. "Proof-Carrying Hardware: Concept and Prototype Tool Flow for Online Verification." International Journal of Reconfigurable Computing 2010 (2010): 1–11. http://dx.doi.org/10.1155/2010/180242.
Full textChen, Kejun, Lei Sun, and Qingxu Deng. "Hardware and software co-verification from security perspective in SoC platforms." Journal of Systems Architecture 122 (January 2022): 102355. http://dx.doi.org/10.1016/j.sysarc.2021.102355.
Full textRushinek, Avi, and Sara F. Rushinek. "Accounting software evaluation: hardware, audit trails, backup, error recovery and security." Managerial Auditing Journal 10, no. 9 (December 1995): 29–37. http://dx.doi.org/10.1108/02686909510100887.
Full textRana, Samir, Ritu Mewari, and Lata Nautiya. "Anti-theft Security System for Vehicles." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 42. http://dx.doi.org/10.14419/ijet.v7i4.12.20990.
Full textNATALIANA, DECY, SABAT ANWARI, and MUHAMMAD SYAHRUL AKBAR. "Implementasi Prototype Sistem Home security dengan Pemanfaatan Kode Akses berbasis Arduino Mega." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 5, no. 2 (February 16, 2018): 119. http://dx.doi.org/10.26760/elkomika.v5i2.119.
Full textIstván, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Full textZhu, Xiao Jing, and Yuan Guai Lin. "Analysis of Web Attack and Design of Defense System." Advanced Materials Research 756-759 (September 2013): 2428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2428.
Full textAchumba, Ifeyinwa Eucharia, Kennedy Chinedu Okafor, Gloria N. Ezeh, and Uchenna Hermes Diala. "OpenFlow Virtual Appliance." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijdcf.2015040103.
Full textBaraneetharan, E. "Review on Deep Learning based Network Security Tools in Detecting Real-Time Vulnerabilities." Journal of Ubiquitous Computing and Communication Technologies 3, no. 4 (January 31, 2022): 289–302. http://dx.doi.org/10.36548/jucct.2021.4.005.
Full textShadeed Al-Mejibli, Intisar, and Dr Nawaf Rasheed Alharbe. "ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY." Iraqi Journal for Computers and Informatics 46, no. 1 (June 30, 2020): 32–39. http://dx.doi.org/10.25195/ijci.v46i1.248.
Full textKaliberda, Elena A., and Andrey M. Shabalin. "SOFTWARE AND HARDWARE STAND AS A MODERN TOOL FOR TEACHING STUDENTS TO CONFIGURE WIRELESS NETWORKS." Russian Journal of Education and Psychology 13, no. 6 (December 20, 2022): 45–59. http://dx.doi.org/10.12731/2658-4034-2022-13-6-45-59.
Full textM., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.
Full textHenkel, Jorg. "Top Picks in Hardware and Embedded Security." IEEE Design & Test 38, no. 3 (June 2021): 4. http://dx.doi.org/10.1109/mdat.2021.3077859.
Full textAlhirabi, Nada, Omer Rana, and Charith Perera. "Security and Privacy Requirements for the Internet of Things." ACM Transactions on Internet of Things 2, no. 1 (February 2021): 1–37. http://dx.doi.org/10.1145/3437537.
Full textPayne, Jeffery. "Integrating Application Security into Software Development." IT Professional 12, no. 2 (March 2010): 6–9. http://dx.doi.org/10.1109/mitp.2010.58.
Full textBrant, Christopher, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah Crandall, and Daniela Oliveira. "Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking." ACM Computing Surveys 55, no. 1 (January 31, 2023): 1–33. http://dx.doi.org/10.1145/3483790.
Full textXiao, Chunhua, Lei Zhang, Yuhua Xie, Weichen Liu, and Duo Liu. "Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing." Security and Communication Networks 2018 (August 27, 2018): 1–24. http://dx.doi.org/10.1155/2018/7631342.
Full textGertner, D. A., D. О. Leontiev, L. S. Nosov, and D. S. Shuchalin. "Hardware and software complex for ensuring information security when using electronic signatures." Vestnik Syktyvkarskogo Universiteta. Seriya 1: Matematika. Mekhanika. Informatika, no. 1 (2021): 43–55. http://dx.doi.org/10.34130/1992-2752_2021_1_43.
Full textPeng, Xiang, Peng Zhang, and Hanben Niu. "Architecture design of virtual-optics data security using parallel hardware and software." Optik 115, no. 1 (2004): 15–22. http://dx.doi.org/10.1078/0030-4026-00322.
Full textLiu, Yi, Hong-qi Zhang, Jiang Liu, and Ying-jie Yang. "A New Approach for Delivering Customized Security Everywhere: Security Service Chain." Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/9534754.
Full textBawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.
Full textZambreno, Joseph, Alok Choudhary, Rahul Simha, Bhagi Narahari, and Nasir Memon. "SAFE-OPS: An approach to embedded software security." ACM Transactions on Embedded Computing Systems 4, no. 1 (February 2005): 189–210. http://dx.doi.org/10.1145/1053271.1053279.
Full textRehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Full textGavrilenko, Andrei V. "DISTANCE LEARNING AND INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 1 (2021): 51–65. http://dx.doi.org/10.28995/2686-679x-2021-1-51-65.
Full textChen, Yun Ping. "Study on the Design of Computer Interlocking System Security's Reliability." Applied Mechanics and Materials 416-417 (September 2013): 1454–57. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1454.
Full textAlekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.
Full textAl-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.
Full textYu, Ran, Jiao Jiao Zhang, Hong Fei Xu, and Shen Jin. "An Integrated Electricity Information Security Monitoring Platform." Applied Mechanics and Materials 701-702 (December 2014): 947–51. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.947.
Full textMittal, Sparsh, Himanshi Gupta, and Srishti Srivastava. "A survey on hardware security of DNN models and accelerators." Journal of Systems Architecture 117 (August 2021): 102163. http://dx.doi.org/10.1016/j.sysarc.2021.102163.
Full text