Literatura académica sobre el tema "NVM Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "NVM Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "NVM Security"
Lei, Mengya, Fan Li, Fang Wang, Dan Feng, Xiaomin Zou y Renzhi Xiao. "SecNVM: An Efficient and Write-Friendly Metadata Crash Consistency Scheme for Secure NVM". ACM Transactions on Architecture and Code Optimization 19, n.º 1 (31 de marzo de 2022): 1–26. http://dx.doi.org/10.1145/3488724.
Texto completoHaywood Dadzie, Thomas, Jiwon Lee, Jihye Kim y Hyunok Oh. "NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory". Electronics 9, n.º 8 (13 de agosto de 2020): 1304. http://dx.doi.org/10.3390/electronics9081304.
Texto completoBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas y Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing". EDFA Technical Articles 24, n.º 4 (1 de noviembre de 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Texto completoHuang, Fang-ting, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang y Yu-kun Zhou. "Enhancing security of NVM-based main memory with dynamic Feistel network mapping". Frontiers of Information Technology & Electronic Engineering 19, n.º 7 (julio de 2018): 847–63. http://dx.doi.org/10.1631/fitee.1601652.
Texto completoKhan, Mohammad Nasim Imtiaz, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay y Swaroop Ghosh. "Comprehensive Study of Side-Channel Attack on Emerging Non-Volatile Memories". Journal of Low Power Electronics and Applications 11, n.º 4 (28 de septiembre de 2021): 38. http://dx.doi.org/10.3390/jlpea11040038.
Texto completoKhan, Mohammad Nasim Imtiaz y Swaroop Ghosh. "Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories". Journal of Low Power Electronics and Applications 11, n.º 4 (24 de septiembre de 2021): 36. http://dx.doi.org/10.3390/jlpea11040036.
Texto completoZou, Yu, Kazi Abu Zubair, Mazen Alwadi, Rakin Muhammad Shadab, Sanjay Gandham, Amro Awad y Mingjie Lin. "ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery". ACM Transactions on Embedded Computing Systems 21, n.º 1 (31 de enero de 2022): 1–32. http://dx.doi.org/10.1145/3492735.
Texto completoHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai y Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology". Networks and Heterogeneous Media 18, n.º 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Texto completoFung, Carol, Jérôme François, Weverton Cordeiro y Mohamed Faten Zhani. "Advanced security management". International Journal of Network Management 29, n.º 3 (mayo de 2019): e2070. http://dx.doi.org/10.1002/nem.2070.
Texto completoMolina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb y Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances". International Journal of Network Management 28, n.º 5 (16 de julio de 2018): e2038. http://dx.doi.org/10.1002/nem.2038.
Texto completoTesis sobre el tema "NVM Security"
Burchett, Ian. "Quantifying Computer Network Security". TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Texto completoGoswami, Pronnoy. "Investigating the Reproducbility of NPM packages". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98491.
Texto completoMaster of Science
Software packages are distributed as pre-compiled binaries to facilitate software development. There are various package repositories for various programming languages such as NPM (JavaScript), pip (Python), and Maven (Java). Developers install these pre-compiled packages in their projects to implement certain functionality. Additionally, these package repositories allow developers to publish new packages and help the developer community to reduce the delivery time and enhance the quality of the software product. Unfortunately, recent articles have revealed an increasing number of attacks on the package repositories. Moreover, developers trust the pre-compiled binaries, which often contain malicious code. To address this challenge, we conduct our empirical investigation to analyze the reproducibility of NPM packages for the JavaScript ecosystem. Reproducible Builds is a concept that allows any individual to verify the build artifacts by replicating the build process of software packages. For instance, if the developers could verify that the build artifacts of the pre-compiled software packages available in the NPM repository are identical to the ones generated when they individually build that specific package, they could mitigate and be aware of the vulnerabilities in the software packages. The build process is usually described in configuration files such as package.json and DOCKERFILE. We chose the NPM registry for our study because of three primary reasons – (1) it is the largest package repository, (2) JavaScript is the most widely used programming language, and (3) there is no prior dataset or investigation that has been conducted by researchers. We took a two-step approach in our study – (1) dataset collection, and (2) source-code differencing for each pair of software package versions. For the dataset collection phase, we downloaded all available releases/versions of 226 popularly used NPM packages and for the code-differencing phase, we used an off-the-shelf tool called diffoscope. We revealed some interesting findings. Firstly, at least one of the 65 packages as found to be non-reproducible, and these packages have millions of downloads per week. Secondly, we found 50 package-versions to have divergent program semantics which high- lights the potential vulnerabilities in the source-code and improper build practices. Thirdly, we found that the uglification of JavaScript code introduces non-determinism in the build process. Our research sheds light on the challenges of verifying the reproducibility of NPM packages with the current state-of-the-art tools and the need to develop better verification tools in the future. To conclude, we believe that our work is a step towards realizing the reproducibility of NPM packages and making the community aware of the implications of non-reproducible build artifacts.
Silva, Tânia Clemente. "A UE e a segurança internacional: uma nova estratégia de segurança europeia num mundo multicomplexo". Master's thesis, Universidade de Évora, 2018. http://hdl.handle.net/10174/24166.
Texto completoTran, Thi Thu Nguyet. "Beneficiary status and level of access to social security policies by farmers in the Mekong Delta, Viet Nam". Thesis, Tran, Thi Thu Nguyet (2022) Beneficiary status and level of access to social security policies by farmers in the Mekong Delta, Viet Nam. PhD thesis, Murdoch University, 2022. https://researchrepository.murdoch.edu.au/id/eprint/65144/.
Texto completoEsteves, Jorge Manuel Gaspar. "Guarda Nacional Republicana: tendências da profissão de oficial num tempo de transição". Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/15732.
Texto completoMasco, Joseph. "The nuclear borderlands : the legacy of the Manhattan Project in post-Cold War New Mexico /". Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 1999. http://wwwlib.umi.com/cr/ucsd/fullcit?p9926561.
Texto completoBa, Hélène Aminatou. "Contribution of contract farming to sustainable value chain upgrading in the Mekong River Delta in Vietnam". Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0025.
Texto completoIn recent years, the structure of the Vietnamese rice sector has changed. From a highly fragmented value chain producing rice for low value-added markets, the shift toward more vertically integrated and coordinated value chains through contract farming has begun to emerge. Contract farming is used as a tool to govern more effectively rice quality and penetrate new and lucrative markets for higher quality rice.Many empirical studies have assessed the role of contract farming in developing economies. Contract farming is perceived as an engine for rural development and a golden opportunity for farmers to have direct access to modern markets, agricultural inputs, credit, and technical support. Worldwide, contract farming adoption is promoted as an institutional innovation. In the Vietnamese rice sector, there is a specific legislation to encourage its diffusion such as the Small Farm Large Field program.This thesis aims at assessing the contribution of contract farming to internalize sustainable production standards in rice value chains. The central assumption of this thesis is that some contract attributes may contribute to improving sustainability. A set of attributes of performance declined in sustainable indicators was selected to test our research hypothesis. The attributes of performance stem from the Sustainable Rice Platform’s principles of sustainable rice production and the existing contract attributes in the Mekong River Delta.In the economic dimension of sustainability, we found that participation in contract farming improves the welfare of rice farmers as farmers selling their paddy using a contract gain, on average, $121 per hectare of paddy more compared to farmers producing outside of a contract. The increase in price is mainly a result of an increase in the selling price (price premium).In the social principle of sustainability, we found that participation in contract farming could improve the welfare of small rice farmers through rent and risk-sharing. Export firms share some of its profits with farmers through a price premium. However, due to the large heterogeneity of contract farming models in the Vietnamese rice sector, not all contract models facilitate risk-sharing. In a marketing contract, farmers bear all the production risks whereas in resource contracts some of the production risks may shift to the export firms. Therefore, resource contracts are more likely to improve equity through risk-sharing between farmers and export firms. Moreover, participation in resource contracts is found to improve farmers’ financial inclusion. Export firms are willing to prefinance farmers under contract. However, the opportunity cost of prefinancing may include the loss of farmers’ autonomy. Evidence from our discrete choice experiment reveals a conflicting interest between farmers and export firms regarding the decision rights in a contract. Last but not least, smallest farmers were excluded from contract farming as firms did not always want to support the transaction costs of dealing with numerous individual farmers. However, our findings suggest that the scale-bias could be successfully relaxed through the Small Farm Large Field program.Finally, in the environmental dimension of sustainability, we examined both firms’ and farmers’ prospective responses to the internalization of sustainability through contract farming using an experimental approach. Farmers are found willing to internalize the environmental dimension of sustainability through contract farming in exchange for a price premium. Export firms are found less likely to implement the GlobalG.A.P./VietGAP or the Pesticide free production standards. The cost of such standard implementation and the lack of institutional support are more likely to justify this outcome
Lukeš, Pavel. "Implementace nových koncových uzlů do firmy a jejich management". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241594.
Texto completoLourenço, Ana Eliza Port. "O Bonfim na Balança: um estudo sobre ruralidade e saúde por meio da análise do estado nutricional das práticas alimentares e da agricultura num bairro de Petrópolis, Rio de Janeiro". reponame:Repositório Institucional da FIOCRUZ, 2010. https://www.arca.fiocruz.br/handle/icict/2555.
Texto completoEmbora o meio rural brasileiro inclua populações diversas, como povos indígenas, agricultores familiares, ribeirinhos e quilombolas, os estudos de saúde no Brasil têm considerado rural como mera oposição a urbano , o que gera implicações epidemiológicas e políticas. Esta tese analisa o significado de rural em saúde, por meio de um estudo no bairro Bonfim, Petrópolis, RJ, incluindo pesquisa etnográfica sobre alimentação e agricultura, e um censo (de 523 famílias) sobre nutrição, anemia, hipertensão arterial e segurança alimentar. O Bonfim constitui área geopolítica urbana, embora apresente aspectos rurais, como agricultura familiar, área de reserva ambiental e ecoturismo. O bairro tem três regiões sócio-espaciais com diferentes ocupações do solo, demografia, condições socioeconômicas e, consequentemente, distintos perfis de saúde. A região com situação socioeconômica mais baixa e pouca agricultura apresentou maior prevalência de anemia e de insegurança alimentar. Na região onde a ocupação agrícola predomina, há menor prevalência de obesidade, de hipertensão arterial e de insegurança alimentar. Por exemplo, a prevalência de obesidade foi de 8 por cento entre os homens adultos da região agrícola e de 17 por cento nas outras regiões. A prevalência de obesidade em adultos no estudo foi cerca de duas vezes maior que a prevalência nacional, sendo maior para mulheres (29,1 por cento) que para homens (15,4 por cento). Essas variações no perfil nutricional associam-se ao nível de envolvimento com a agricultura e à preferência por alimentos industrializados. A necessidade de dedicar várias horas ao trabalho agrícola é uma das principais causas para a compra de alimentos em vez de plantar para o consumo familiar. A combinação de métodos deste estudo salienta importantes fontes de variação na experiência rural brasileira, sugerindo repensar o uso de rural em estudos de saúde, de forma a considerar as identidades sociais e o contexto local.
Although what is called “rural Brazil” may include populations as diverse as farmers, indigenous peoples, peasant fishing communities and populations of African ancestry, most health studies in Brazil have considered “rural” as a simple opposition to “urban”. This may interfere in epidemiological analyses and health policies. In this thesis I discuss the meaning of rural in health by presenting information about Bonfim, a community located in a mountainous region of Rio de Janeiro state. The study integrated ethnographic research about diet and agriculture, and a census (of 523 families) about nutrition, anemia, blood pressure and food security. Bonfim is geopolitically an urban area, though it contains rural aspects, such as farmland, parkland and ecotourism services. The community is divided into three socially defined regions, each with different land usage, demography, socioeconomic status and resultant health profiles. In the region where socioeconomic status is lower and farming work is rare, there was a higher prevalence of anemia and food insecurity. In the region where farm work predominates, there was a lower prevalence of obesity, hypertension and food insecurity. For example, in the farming region, 8% of adult men were obese, while in the other regions 17% of adult men were obese. The prevalence of obesity for adults in this study was twice the national prevalence. The prevalence of obesity in adult women was 29%, while in adult men it was 15%. These nutritional profile variations are associated with the level of involvement with agriculture and extent of local preferences for industrialized food. The need to spend long hours working on the farm is one of the main causes for purchasing food rather than growing it for family consumption. This fine-grained mixed-methods research sheds light on important sources of variation in the rural experience in Brazil. It also suggests a reconsideration of the use of the concept of rural in health studies, urging a more accurate accounting of social identities and local contexts.
Mondon, Sylvain. "Une approche par la pratique des relations entre action, organisation et décision en contexte extrême : le cas de la course au large à la voile". Thesis, Paris, HESAM, 2020. http://www.theses.fr/2020HESAC019.
Texto completoResearch issue is dedicated to the relationships between action, decision and organization in extreme context during performance seeking. These relationships are approached from the point of view of an ongoing action in order to analyze time lags management in decision-making practices in a time perspective of action. Two offshore racing sample are analyzed using an ethnomethodological approach by decision-making practice of the organized activity based on an immersion within the organization during competition. Time lags between the perception of events at stake and their management within the organization are modeled in the form of decision phenomenon. We conclude that, in extreme context, organization’s performance is linked to its ability to implement a decision-making practice consistent with temporal circumstances of the action. This result contributes to a practice theory of organization
Libros sobre el tema "NVM Security"
Verma, Madan Mohan. NAM and security in Asia-Pacific region. New Delhi, India: Indian Institute for Non-Aligned Studies, 1988.
Buscar texto completoNam, UNDP Viet, ed. How progressive is social security in Viet Nam? Hanoi: UNDP Viet Nam, 2006.
Buscar texto completoWaehner, Joerg. Einstrich-Keinstrich: NVA-Tagebuch. Köln: Kiepenheuer & Witsch, 2006.
Buscar texto completoNam-Pukhan kwa kukche chŏngch'i. Kyŏngju-si: Sinji Sŏwŏn, 2011.
Buscar texto completoIn'gan anbo wa Nam-Pukhan hyŏmnyŏk. Sŏul: Ak'anet, 2013.
Buscar texto completoChʻi-jŏng, Pak y Kang Sŏk-chʻan, eds. Nam-Pukhan kwa Tongbuga kukche kwanʼgye. Sŏul-si: Kŏnʼguk Taehakkyo Chʻulpʻanbu, 2006.
Buscar texto completoHyŏndae kunsa munje wa Nam-Pukhan. Sŏul: Hyŏngsŏl Chʻulpʻansa, 2001.
Buscar texto completoKramer, Ellen. Thuật ngữ an sinh xã hội Việt Nam. Hà Nội: Viện khoa học lao động và xã hội, 2011.
Buscar texto completoKoós, Anna. A nem kívánt hagyaték. Budapest: Akadémiai Kiadó, 2006.
Buscar texto completoPak, Chin. Nam-Pukhan sahoe pojang chedo ŭi pigyo mit tʻonghap panghyang. Sŏul Tʻŭkpyŏlsi: Hanʾguk Kaebal Yŏnʾguwŏn, 1994.
Buscar texto completoCapítulos de libros sobre el tema "NVM Security"
Mulligan, Mark, Arnout van Soesbergen, Caitlin Douglas y Sophia Burke. "Natural Flood Management in the Thames Basin: Building Evidence for What Will and Will Not Work". En Water Security in a New World, 223–46. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_12.
Texto completoMulligan, Mark, Sophia Burke, Caitlin Douglas y Arnout van Soesbergen. "Methodologies to Assess and Map the Biophysical Effectiveness of Nature Based Solutions". En Water Security in a New World, 51–65. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_4.
Texto completoKaplan, Berkay y Jingyu Qian. "A Survey on Common Threats in npm and PyPi Registries". En Deployable Machine Learning for Security Defense, 132–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9_6.
Texto completoMiranda, Lucas, Cainã Figueiredo, Daniel Sadoc Menasché y Anton Kocheturov. "Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub Pages". En Cyber Security, Cryptology, and Machine Learning, 511–22. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2_36.
Texto completoHassard, J. F. y S.-R. Sellevåg. "Disinformation in the Deployment and Mitigation of CBRNE Attacks in the Age of New Social Media (NSM)". En Advanced Sciences and Technologies for Security Applications, 209–18. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17374-5_10.
Texto completoNapaumporn, Bongkot. "Forgotten Stateless Vietnamese in Thailand". En IMISCOE Research Series, 57–74. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25748-3_4.
Texto completoTakahashi, Ryo. "Property Rights and Natural Resource Management in Developing Countries". En Emerging-Economy State and International Policy Studies, 127–38. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5542-6_10.
Texto completoEastin, J. "Climate change, livelihoods and domestic violence in Indonesia." En Gender, climate change and livelihoods: vulnerabilities and adaptations, 94–106. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789247053.0008.
Texto completo"Foreword: NSM/PST". En The City between Freedom and Security, 9–10. Birkhäuser, 2017. http://dx.doi.org/10.1515/9783035607611-002.
Texto completo"Changing approaches to food security in Viet Nam". En New Challenges to Food Security, 255–71. Routledge, 2014. http://dx.doi.org/10.4324/9780203371176-22.
Texto completoActas de conferencias sobre el tema "NVM Security"
Skorobogatov, Sergei. "Compromising device security via NVM controller vulnerability". En 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE). IEEE, 2020. http://dx.doi.org/10.1109/paine49178.2020.9337736.
Texto completoYang, Chaofei, Beiye Liu, Yandan Wang, Yiran Chen, Hai Li, Xian Zhang y Guangyu Sun. "The Applications of NVM Technology in Hardware Security". En GLSVLSI '16: Great Lakes Symposium on VLSI 2016. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2902961.2903043.
Texto completoXu, Jie, Dan Feng, Yu Hua, Fangting Huang, Wen Zhou, Wei Tong y Jingning Liu. "An Efficient Spare-Line Replacement Scheme to Enhance NVM Security". En DAC '19: The 56th Annual Design Automation Conference 2019. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3316781.3317767.
Texto completoNagarajan, Karthikeyan, Mohammad Nasim Imtiaz Khan y Swaroop Ghosh. "ENTT: A Family of Emerging NVM-based Trojan Triggers". En 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2019. http://dx.doi.org/10.1109/hst.2019.8740836.
Texto completoSun, Zhiwen, Zhiping Jia, Xiaojun Cai, Zhiyong Zhang y Lei Ju. "AIMR: An Adaptive Page Management Policy for Hybrid Memory Architecture with NVM and DRAM". En 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.179.
Texto completoDong, Wei, Xin Li, Yanbin Li, Meikang Qiu, Lei Dou, Lei Ju y Zhiping Jia. "Minimizing Update Bits of NVM-Based Main Memory Using Bit Flipping and Cyclic Shifting". En 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.194.
Texto completoLeitold, Ferenc, Anna Medve y Levente Kovacs. "SIP security problems in NGM Services". En The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007). IEEE, 2007. http://dx.doi.org/10.1109/ngmast.2007.4343428.
Texto completoHogervorst, Maarten A. y Frank L. Kooi. "NVG-the-Day: towards realistic night-vision training". En SPIE Security + Defence, editado por David A. Huckridge y Reinhard Ebert. SPIE, 2014. http://dx.doi.org/10.1117/12.2066700.
Texto completoToet, Alexander, Frank L. Kooi, Frido Kuijper y Roland J. M. Smeenk. "Objective assessment of simulated daytime and NVG image fidelity". En Defense and Security, editado por Jacques G. Verly. SPIE, 2005. http://dx.doi.org/10.1117/12.602463.
Texto completoHammons, Tom y Zbigniew Styczynski. "Network Security Management (NSM) focused on Dispersed Generation". En Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596030.
Texto completoInformes sobre el tema "NVM Security"
Jonassen, Rachael, Mikael Skou Andersen, Jacqueline Cottrell y Sandeep Bhattacharya. Carbon Pricing and Fossil Fuel Subsidy Rationalization Tool Kit. Asian Development Bank, julio de 2023. http://dx.doi.org/10.22617/tim230241.
Texto completoCooperation for Water, Energy, and Food Security in Transboundary Basins under Changing Climate. Vientiane, Lao PDR: Mekong River Commission Secretariat, septiembre de 2014. http://dx.doi.org/10.52107/mrc.ajgf87.
Texto completo