Gotowa bibliografia na temat „NVM Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „NVM Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "NVM Security"
Lei, Mengya, Fan Li, Fang Wang, Dan Feng, Xiaomin Zou i Renzhi Xiao. "SecNVM: An Efficient and Write-Friendly Metadata Crash Consistency Scheme for Secure NVM". ACM Transactions on Architecture and Code Optimization 19, nr 1 (31.03.2022): 1–26. http://dx.doi.org/10.1145/3488724.
Pełny tekst źródłaHaywood Dadzie, Thomas, Jiwon Lee, Jihye Kim i Hyunok Oh. "NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory". Electronics 9, nr 8 (13.08.2020): 1304. http://dx.doi.org/10.3390/electronics9081304.
Pełny tekst źródłaBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas i Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing". EDFA Technical Articles 24, nr 4 (1.11.2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Pełny tekst źródłaHuang, Fang-ting, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang i Yu-kun Zhou. "Enhancing security of NVM-based main memory with dynamic Feistel network mapping". Frontiers of Information Technology & Electronic Engineering 19, nr 7 (lipiec 2018): 847–63. http://dx.doi.org/10.1631/fitee.1601652.
Pełny tekst źródłaKhan, Mohammad Nasim Imtiaz, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay i Swaroop Ghosh. "Comprehensive Study of Side-Channel Attack on Emerging Non-Volatile Memories". Journal of Low Power Electronics and Applications 11, nr 4 (28.09.2021): 38. http://dx.doi.org/10.3390/jlpea11040038.
Pełny tekst źródłaKhan, Mohammad Nasim Imtiaz, i Swaroop Ghosh. "Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories". Journal of Low Power Electronics and Applications 11, nr 4 (24.09.2021): 36. http://dx.doi.org/10.3390/jlpea11040036.
Pełny tekst źródłaZou, Yu, Kazi Abu Zubair, Mazen Alwadi, Rakin Muhammad Shadab, Sanjay Gandham, Amro Awad i Mingjie Lin. "ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery". ACM Transactions on Embedded Computing Systems 21, nr 1 (31.01.2022): 1–32. http://dx.doi.org/10.1145/3492735.
Pełny tekst źródłaHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai i Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology". Networks and Heterogeneous Media 18, nr 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Pełny tekst źródłaFung, Carol, Jérôme François, Weverton Cordeiro i Mohamed Faten Zhani. "Advanced security management". International Journal of Network Management 29, nr 3 (maj 2019): e2070. http://dx.doi.org/10.1002/nem.2070.
Pełny tekst źródłaMolina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb i Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances". International Journal of Network Management 28, nr 5 (16.07.2018): e2038. http://dx.doi.org/10.1002/nem.2038.
Pełny tekst źródłaRozprawy doktorskie na temat "NVM Security"
Burchett, Ian. "Quantifying Computer Network Security". TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Pełny tekst źródłaGoswami, Pronnoy. "Investigating the Reproducbility of NPM packages". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98491.
Pełny tekst źródłaMaster of Science
Software packages are distributed as pre-compiled binaries to facilitate software development. There are various package repositories for various programming languages such as NPM (JavaScript), pip (Python), and Maven (Java). Developers install these pre-compiled packages in their projects to implement certain functionality. Additionally, these package repositories allow developers to publish new packages and help the developer community to reduce the delivery time and enhance the quality of the software product. Unfortunately, recent articles have revealed an increasing number of attacks on the package repositories. Moreover, developers trust the pre-compiled binaries, which often contain malicious code. To address this challenge, we conduct our empirical investigation to analyze the reproducibility of NPM packages for the JavaScript ecosystem. Reproducible Builds is a concept that allows any individual to verify the build artifacts by replicating the build process of software packages. For instance, if the developers could verify that the build artifacts of the pre-compiled software packages available in the NPM repository are identical to the ones generated when they individually build that specific package, they could mitigate and be aware of the vulnerabilities in the software packages. The build process is usually described in configuration files such as package.json and DOCKERFILE. We chose the NPM registry for our study because of three primary reasons – (1) it is the largest package repository, (2) JavaScript is the most widely used programming language, and (3) there is no prior dataset or investigation that has been conducted by researchers. We took a two-step approach in our study – (1) dataset collection, and (2) source-code differencing for each pair of software package versions. For the dataset collection phase, we downloaded all available releases/versions of 226 popularly used NPM packages and for the code-differencing phase, we used an off-the-shelf tool called diffoscope. We revealed some interesting findings. Firstly, at least one of the 65 packages as found to be non-reproducible, and these packages have millions of downloads per week. Secondly, we found 50 package-versions to have divergent program semantics which high- lights the potential vulnerabilities in the source-code and improper build practices. Thirdly, we found that the uglification of JavaScript code introduces non-determinism in the build process. Our research sheds light on the challenges of verifying the reproducibility of NPM packages with the current state-of-the-art tools and the need to develop better verification tools in the future. To conclude, we believe that our work is a step towards realizing the reproducibility of NPM packages and making the community aware of the implications of non-reproducible build artifacts.
Silva, Tânia Clemente. "A UE e a segurança internacional: uma nova estratégia de segurança europeia num mundo multicomplexo". Master's thesis, Universidade de Évora, 2018. http://hdl.handle.net/10174/24166.
Pełny tekst źródłaTran, Thi Thu Nguyet. "Beneficiary status and level of access to social security policies by farmers in the Mekong Delta, Viet Nam". Thesis, Tran, Thi Thu Nguyet (2022) Beneficiary status and level of access to social security policies by farmers in the Mekong Delta, Viet Nam. PhD thesis, Murdoch University, 2022. https://researchrepository.murdoch.edu.au/id/eprint/65144/.
Pełny tekst źródłaEsteves, Jorge Manuel Gaspar. "Guarda Nacional Republicana: tendências da profissão de oficial num tempo de transição". Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/15732.
Pełny tekst źródłaMasco, Joseph. "The nuclear borderlands : the legacy of the Manhattan Project in post-Cold War New Mexico /". Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 1999. http://wwwlib.umi.com/cr/ucsd/fullcit?p9926561.
Pełny tekst źródłaBa, Hélène Aminatou. "Contribution of contract farming to sustainable value chain upgrading in the Mekong River Delta in Vietnam". Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0025.
Pełny tekst źródłaIn recent years, the structure of the Vietnamese rice sector has changed. From a highly fragmented value chain producing rice for low value-added markets, the shift toward more vertically integrated and coordinated value chains through contract farming has begun to emerge. Contract farming is used as a tool to govern more effectively rice quality and penetrate new and lucrative markets for higher quality rice.Many empirical studies have assessed the role of contract farming in developing economies. Contract farming is perceived as an engine for rural development and a golden opportunity for farmers to have direct access to modern markets, agricultural inputs, credit, and technical support. Worldwide, contract farming adoption is promoted as an institutional innovation. In the Vietnamese rice sector, there is a specific legislation to encourage its diffusion such as the Small Farm Large Field program.This thesis aims at assessing the contribution of contract farming to internalize sustainable production standards in rice value chains. The central assumption of this thesis is that some contract attributes may contribute to improving sustainability. A set of attributes of performance declined in sustainable indicators was selected to test our research hypothesis. The attributes of performance stem from the Sustainable Rice Platform’s principles of sustainable rice production and the existing contract attributes in the Mekong River Delta.In the economic dimension of sustainability, we found that participation in contract farming improves the welfare of rice farmers as farmers selling their paddy using a contract gain, on average, $121 per hectare of paddy more compared to farmers producing outside of a contract. The increase in price is mainly a result of an increase in the selling price (price premium).In the social principle of sustainability, we found that participation in contract farming could improve the welfare of small rice farmers through rent and risk-sharing. Export firms share some of its profits with farmers through a price premium. However, due to the large heterogeneity of contract farming models in the Vietnamese rice sector, not all contract models facilitate risk-sharing. In a marketing contract, farmers bear all the production risks whereas in resource contracts some of the production risks may shift to the export firms. Therefore, resource contracts are more likely to improve equity through risk-sharing between farmers and export firms. Moreover, participation in resource contracts is found to improve farmers’ financial inclusion. Export firms are willing to prefinance farmers under contract. However, the opportunity cost of prefinancing may include the loss of farmers’ autonomy. Evidence from our discrete choice experiment reveals a conflicting interest between farmers and export firms regarding the decision rights in a contract. Last but not least, smallest farmers were excluded from contract farming as firms did not always want to support the transaction costs of dealing with numerous individual farmers. However, our findings suggest that the scale-bias could be successfully relaxed through the Small Farm Large Field program.Finally, in the environmental dimension of sustainability, we examined both firms’ and farmers’ prospective responses to the internalization of sustainability through contract farming using an experimental approach. Farmers are found willing to internalize the environmental dimension of sustainability through contract farming in exchange for a price premium. Export firms are found less likely to implement the GlobalG.A.P./VietGAP or the Pesticide free production standards. The cost of such standard implementation and the lack of institutional support are more likely to justify this outcome
Lukeš, Pavel. "Implementace nových koncových uzlů do firmy a jejich management". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241594.
Pełny tekst źródłaLourenço, Ana Eliza Port. "O Bonfim na Balança: um estudo sobre ruralidade e saúde por meio da análise do estado nutricional das práticas alimentares e da agricultura num bairro de Petrópolis, Rio de Janeiro". reponame:Repositório Institucional da FIOCRUZ, 2010. https://www.arca.fiocruz.br/handle/icict/2555.
Pełny tekst źródłaEmbora o meio rural brasileiro inclua populações diversas, como povos indígenas, agricultores familiares, ribeirinhos e quilombolas, os estudos de saúde no Brasil têm considerado rural como mera oposição a urbano , o que gera implicações epidemiológicas e políticas. Esta tese analisa o significado de rural em saúde, por meio de um estudo no bairro Bonfim, Petrópolis, RJ, incluindo pesquisa etnográfica sobre alimentação e agricultura, e um censo (de 523 famílias) sobre nutrição, anemia, hipertensão arterial e segurança alimentar. O Bonfim constitui área geopolítica urbana, embora apresente aspectos rurais, como agricultura familiar, área de reserva ambiental e ecoturismo. O bairro tem três regiões sócio-espaciais com diferentes ocupações do solo, demografia, condições socioeconômicas e, consequentemente, distintos perfis de saúde. A região com situação socioeconômica mais baixa e pouca agricultura apresentou maior prevalência de anemia e de insegurança alimentar. Na região onde a ocupação agrícola predomina, há menor prevalência de obesidade, de hipertensão arterial e de insegurança alimentar. Por exemplo, a prevalência de obesidade foi de 8 por cento entre os homens adultos da região agrícola e de 17 por cento nas outras regiões. A prevalência de obesidade em adultos no estudo foi cerca de duas vezes maior que a prevalência nacional, sendo maior para mulheres (29,1 por cento) que para homens (15,4 por cento). Essas variações no perfil nutricional associam-se ao nível de envolvimento com a agricultura e à preferência por alimentos industrializados. A necessidade de dedicar várias horas ao trabalho agrícola é uma das principais causas para a compra de alimentos em vez de plantar para o consumo familiar. A combinação de métodos deste estudo salienta importantes fontes de variação na experiência rural brasileira, sugerindo repensar o uso de rural em estudos de saúde, de forma a considerar as identidades sociais e o contexto local.
Although what is called “rural Brazil” may include populations as diverse as farmers, indigenous peoples, peasant fishing communities and populations of African ancestry, most health studies in Brazil have considered “rural” as a simple opposition to “urban”. This may interfere in epidemiological analyses and health policies. In this thesis I discuss the meaning of rural in health by presenting information about Bonfim, a community located in a mountainous region of Rio de Janeiro state. The study integrated ethnographic research about diet and agriculture, and a census (of 523 families) about nutrition, anemia, blood pressure and food security. Bonfim is geopolitically an urban area, though it contains rural aspects, such as farmland, parkland and ecotourism services. The community is divided into three socially defined regions, each with different land usage, demography, socioeconomic status and resultant health profiles. In the region where socioeconomic status is lower and farming work is rare, there was a higher prevalence of anemia and food insecurity. In the region where farm work predominates, there was a lower prevalence of obesity, hypertension and food insecurity. For example, in the farming region, 8% of adult men were obese, while in the other regions 17% of adult men were obese. The prevalence of obesity for adults in this study was twice the national prevalence. The prevalence of obesity in adult women was 29%, while in adult men it was 15%. These nutritional profile variations are associated with the level of involvement with agriculture and extent of local preferences for industrialized food. The need to spend long hours working on the farm is one of the main causes for purchasing food rather than growing it for family consumption. This fine-grained mixed-methods research sheds light on important sources of variation in the rural experience in Brazil. It also suggests a reconsideration of the use of the concept of rural in health studies, urging a more accurate accounting of social identities and local contexts.
Mondon, Sylvain. "Une approche par la pratique des relations entre action, organisation et décision en contexte extrême : le cas de la course au large à la voile". Thesis, Paris, HESAM, 2020. http://www.theses.fr/2020HESAC019.
Pełny tekst źródłaResearch issue is dedicated to the relationships between action, decision and organization in extreme context during performance seeking. These relationships are approached from the point of view of an ongoing action in order to analyze time lags management in decision-making practices in a time perspective of action. Two offshore racing sample are analyzed using an ethnomethodological approach by decision-making practice of the organized activity based on an immersion within the organization during competition. Time lags between the perception of events at stake and their management within the organization are modeled in the form of decision phenomenon. We conclude that, in extreme context, organization’s performance is linked to its ability to implement a decision-making practice consistent with temporal circumstances of the action. This result contributes to a practice theory of organization
Książki na temat "NVM Security"
Verma, Madan Mohan. NAM and security in Asia-Pacific region. New Delhi, India: Indian Institute for Non-Aligned Studies, 1988.
Znajdź pełny tekst źródłaNam, UNDP Viet, red. How progressive is social security in Viet Nam? Hanoi: UNDP Viet Nam, 2006.
Znajdź pełny tekst źródłaWaehner, Joerg. Einstrich-Keinstrich: NVA-Tagebuch. Köln: Kiepenheuer & Witsch, 2006.
Znajdź pełny tekst źródłaNam-Pukhan kwa kukche chŏngch'i. Kyŏngju-si: Sinji Sŏwŏn, 2011.
Znajdź pełny tekst źródłaIn'gan anbo wa Nam-Pukhan hyŏmnyŏk. Sŏul: Ak'anet, 2013.
Znajdź pełny tekst źródłaChʻi-jŏng, Pak, i Kang Sŏk-chʻan, red. Nam-Pukhan kwa Tongbuga kukche kwanʼgye. Sŏul-si: Kŏnʼguk Taehakkyo Chʻulpʻanbu, 2006.
Znajdź pełny tekst źródłaHyŏndae kunsa munje wa Nam-Pukhan. Sŏul: Hyŏngsŏl Chʻulpʻansa, 2001.
Znajdź pełny tekst źródłaKramer, Ellen. Thuật ngữ an sinh xã hội Việt Nam. Hà Nội: Viện khoa học lao động và xã hội, 2011.
Znajdź pełny tekst źródłaKoós, Anna. A nem kívánt hagyaték. Budapest: Akadémiai Kiadó, 2006.
Znajdź pełny tekst źródłaPak, Chin. Nam-Pukhan sahoe pojang chedo ŭi pigyo mit tʻonghap panghyang. Sŏul Tʻŭkpyŏlsi: Hanʾguk Kaebal Yŏnʾguwŏn, 1994.
Znajdź pełny tekst źródłaCzęści książek na temat "NVM Security"
Mulligan, Mark, Arnout van Soesbergen, Caitlin Douglas i Sophia Burke. "Natural Flood Management in the Thames Basin: Building Evidence for What Will and Will Not Work". W Water Security in a New World, 223–46. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_12.
Pełny tekst źródłaMulligan, Mark, Sophia Burke, Caitlin Douglas i Arnout van Soesbergen. "Methodologies to Assess and Map the Biophysical Effectiveness of Nature Based Solutions". W Water Security in a New World, 51–65. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_4.
Pełny tekst źródłaKaplan, Berkay, i Jingyu Qian. "A Survey on Common Threats in npm and PyPi Registries". W Deployable Machine Learning for Security Defense, 132–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87839-9_6.
Pełny tekst źródłaMiranda, Lucas, Cainã Figueiredo, Daniel Sadoc Menasché i Anton Kocheturov. "Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub Pages". W Cyber Security, Cryptology, and Machine Learning, 511–22. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2_36.
Pełny tekst źródłaHassard, J. F., i S.-R. Sellevåg. "Disinformation in the Deployment and Mitigation of CBRNE Attacks in the Age of New Social Media (NSM)". W Advanced Sciences and Technologies for Security Applications, 209–18. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17374-5_10.
Pełny tekst źródłaNapaumporn, Bongkot. "Forgotten Stateless Vietnamese in Thailand". W IMISCOE Research Series, 57–74. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25748-3_4.
Pełny tekst źródłaTakahashi, Ryo. "Property Rights and Natural Resource Management in Developing Countries". W Emerging-Economy State and International Policy Studies, 127–38. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5542-6_10.
Pełny tekst źródłaEastin, J. "Climate change, livelihoods and domestic violence in Indonesia." W Gender, climate change and livelihoods: vulnerabilities and adaptations, 94–106. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789247053.0008.
Pełny tekst źródła"Foreword: NSM/PST". W The City between Freedom and Security, 9–10. Birkhäuser, 2017. http://dx.doi.org/10.1515/9783035607611-002.
Pełny tekst źródła"Changing approaches to food security in Viet Nam". W New Challenges to Food Security, 255–71. Routledge, 2014. http://dx.doi.org/10.4324/9780203371176-22.
Pełny tekst źródłaStreszczenia konferencji na temat "NVM Security"
Skorobogatov, Sergei. "Compromising device security via NVM controller vulnerability". W 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE). IEEE, 2020. http://dx.doi.org/10.1109/paine49178.2020.9337736.
Pełny tekst źródłaYang, Chaofei, Beiye Liu, Yandan Wang, Yiran Chen, Hai Li, Xian Zhang i Guangyu Sun. "The Applications of NVM Technology in Hardware Security". W GLSVLSI '16: Great Lakes Symposium on VLSI 2016. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2902961.2903043.
Pełny tekst źródłaXu, Jie, Dan Feng, Yu Hua, Fangting Huang, Wen Zhou, Wei Tong i Jingning Liu. "An Efficient Spare-Line Replacement Scheme to Enhance NVM Security". W DAC '19: The 56th Annual Design Automation Conference 2019. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3316781.3317767.
Pełny tekst źródłaNagarajan, Karthikeyan, Mohammad Nasim Imtiaz Khan i Swaroop Ghosh. "ENTT: A Family of Emerging NVM-based Trojan Triggers". W 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2019. http://dx.doi.org/10.1109/hst.2019.8740836.
Pełny tekst źródłaSun, Zhiwen, Zhiping Jia, Xiaojun Cai, Zhiyong Zhang i Lei Ju. "AIMR: An Adaptive Page Management Policy for Hybrid Memory Architecture with NVM and DRAM". W 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.179.
Pełny tekst źródłaDong, Wei, Xin Li, Yanbin Li, Meikang Qiu, Lei Dou, Lei Ju i Zhiping Jia. "Minimizing Update Bits of NVM-Based Main Memory Using Bit Flipping and Cyclic Shifting". W 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.194.
Pełny tekst źródłaLeitold, Ferenc, Anna Medve i Levente Kovacs. "SIP security problems in NGM Services". W The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007). IEEE, 2007. http://dx.doi.org/10.1109/ngmast.2007.4343428.
Pełny tekst źródłaHogervorst, Maarten A., i Frank L. Kooi. "NVG-the-Day: towards realistic night-vision training". W SPIE Security + Defence, redaktorzy David A. Huckridge i Reinhard Ebert. SPIE, 2014. http://dx.doi.org/10.1117/12.2066700.
Pełny tekst źródłaToet, Alexander, Frank L. Kooi, Frido Kuijper i Roland J. M. Smeenk. "Objective assessment of simulated daytime and NVG image fidelity". W Defense and Security, redaktor Jacques G. Verly. SPIE, 2005. http://dx.doi.org/10.1117/12.602463.
Pełny tekst źródłaHammons, Tom, i Zbigniew Styczynski. "Network Security Management (NSM) focused on Dispersed Generation". W Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596030.
Pełny tekst źródłaRaporty organizacyjne na temat "NVM Security"
Jonassen, Rachael, Mikael Skou Andersen, Jacqueline Cottrell i Sandeep Bhattacharya. Carbon Pricing and Fossil Fuel Subsidy Rationalization Tool Kit. Asian Development Bank, lipiec 2023. http://dx.doi.org/10.22617/tim230241.
Pełny tekst źródłaCooperation for Water, Energy, and Food Security in Transboundary Basins under Changing Climate. Vientiane, Lao PDR: Mekong River Commission Secretariat, wrzesień 2014. http://dx.doi.org/10.52107/mrc.ajgf87.
Pełny tekst źródła