Статті в журналах з теми "NVM Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "NVM Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Lei, Mengya, Fan Li, Fang Wang, Dan Feng, Xiaomin Zou, and Renzhi Xiao. "SecNVM: An Efficient and Write-Friendly Metadata Crash Consistency Scheme for Secure NVM." ACM Transactions on Architecture and Code Optimization 19, no. 1 (March 31, 2022): 1–26. http://dx.doi.org/10.1145/3488724.
Повний текст джерелаHaywood Dadzie, Thomas, Jiwon Lee, Jihye Kim, and Hyunok Oh. "NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory." Electronics 9, no. 8 (August 13, 2020): 1304. http://dx.doi.org/10.3390/electronics9081304.
Повний текст джерелаBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Повний текст джерелаHuang, Fang-ting, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang, and Yu-kun Zhou. "Enhancing security of NVM-based main memory with dynamic Feistel network mapping." Frontiers of Information Technology & Electronic Engineering 19, no. 7 (July 2018): 847–63. http://dx.doi.org/10.1631/fitee.1601652.
Повний текст джерелаKhan, Mohammad Nasim Imtiaz, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay, and Swaroop Ghosh. "Comprehensive Study of Side-Channel Attack on Emerging Non-Volatile Memories." Journal of Low Power Electronics and Applications 11, no. 4 (September 28, 2021): 38. http://dx.doi.org/10.3390/jlpea11040038.
Повний текст джерелаKhan, Mohammad Nasim Imtiaz, and Swaroop Ghosh. "Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories." Journal of Low Power Electronics and Applications 11, no. 4 (September 24, 2021): 36. http://dx.doi.org/10.3390/jlpea11040036.
Повний текст джерелаZou, Yu, Kazi Abu Zubair, Mazen Alwadi, Rakin Muhammad Shadab, Sanjay Gandham, Amro Awad, and Mingjie Lin. "ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery." ACM Transactions on Embedded Computing Systems 21, no. 1 (January 31, 2022): 1–32. http://dx.doi.org/10.1145/3492735.
Повний текст джерелаHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, and Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology." Networks and Heterogeneous Media 18, no. 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Повний текст джерелаFung, Carol, Jérôme François, Weverton Cordeiro, and Mohamed Faten Zhani. "Advanced security management." International Journal of Network Management 29, no. 3 (May 2019): e2070. http://dx.doi.org/10.1002/nem.2070.
Повний текст джерелаMolina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances." International Journal of Network Management 28, no. 5 (July 16, 2018): e2038. http://dx.doi.org/10.1002/nem.2038.
Повний текст джерелаRöpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (November 11, 2015): 6–24. http://dx.doi.org/10.1002/nem.1918.
Повний текст джерелаBanes, David. "Security and the Enterprise Network." International Journal of Network Management 5, no. 4 (July 1995): 198–206. http://dx.doi.org/10.1002/nem.4560050408.
Повний текст джерелаOnyango, Calvin, Susan Karenya Luvitaa, Kibet Lagat, Alexandra Hüsken, Inga Smit, and Marcus Schmidt. "Utilisation of Amaranth and Finger Millet as Ingredients in Wheat Dough and Bread for Increased Agro-Food Biodiversity." Foods 11, no. 7 (March 22, 2022): 911. http://dx.doi.org/10.3390/foods11070911.
Повний текст джерелаHeld, Gilbert. "Focus on the CyberAngel security program." International Journal of Network Management 14, no. 3 (May 2004): 213–19. http://dx.doi.org/10.1002/nem.522.
Повний текст джерелаBakry, Saad Haj. "Development of security policies for private networks." International Journal of Network Management 13, no. 3 (2003): 203–10. http://dx.doi.org/10.1002/nem.472.
Повний текст джерелаCastonguay, Julie, and Els Sol. "Benchmarking as NPM Instrument in Activating Social Security Policies." European Journal of Social Security 12, no. 4 (December 2010): 324–42. http://dx.doi.org/10.1177/138826271001200405.
Повний текст джерелаLiu, Jie, Xiaojun Tong, Zhu Wang, Jing Ma, and Longteng Yi. "An Improved Rao–Nam Cryptosystem Based on Fractional Order Hyperchaotic System and EDF–QC–LDPC." International Journal of Bifurcation and Chaos 29, no. 09 (August 2019): 1950122. http://dx.doi.org/10.1142/s0218127419501220.
Повний текст джерелаSiahaan, R. Fanry, Preddy Marpaung, Ibnu Febrian, and Widia Putri. "Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia." Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) 22, no. 2 (August 11, 2023): 348. http://dx.doi.org/10.53513/jis.v22i2.8773.
Повний текст джерелаWilliams, Ruth. "Data security." Nursing Management 23, no. 5 (September 2016): 10. http://dx.doi.org/10.7748/nm.23.5.10.s14.
Повний текст джерелаFarooqi, Farkhanda I. "The Inequities of the Supplemental Security Income Program." Professional Case Management 25, no. 5 (September 2020): 291–96. http://dx.doi.org/10.1097/ncm.0000000000000460.
Повний текст джерелаKropiwiec, Cássio Ditzel, Edgard Jamhour, Manoel Camillo Penna, and Guy Pujolle. "Multi-constraint security policies for delegated firewall administration." International Journal of Network Management 21, no. 6 (February 11, 2011): 469–93. http://dx.doi.org/10.1002/nem.774.
Повний текст джерелаRoss, Steven J. "Is It Security or Disaster Recovery? Who Cares?" International Journal of Network Management 5, no. 4 (July 1995): 193–97. http://dx.doi.org/10.1002/nem.4560050407.
Повний текст джерелаCline, Gregory P. "Internet Firewall Servers Address Burning Corporate Security Issues." International Journal of Network Management 5, no. 4 (July 1995): 230–32. http://dx.doi.org/10.1002/nem.4560050412.
Повний текст джерелаUrien, Pascal, and Guy Pujolle. "Security and privacy for the next wireless generation." International Journal of Network Management 18, no. 2 (March 2008): 129–45. http://dx.doi.org/10.1002/nem.678.
Повний текст джерелаNechay, A. A., and P. E. Kotikov. "Control of information security." Scientific Bulletin, no. 2 (2014): 86–92. http://dx.doi.org/10.17117/nv.2014.02.086.
Повний текст джерелаFung, Carol, Mohamed Faten Zhani, Weverton Cordeiro, and Jérôme François. "Special issue on security for emerging open networking technologies." International Journal of Network Management 28, no. 1 (October 9, 2017): e2010. http://dx.doi.org/10.1002/nem.2010.
Повний текст джерелаChao, Han-Chieh, T. Y. Wu, and Jiann-Liang Chen. "Security-enhanced packet video with dynamic multicast throughput adjustment." International Journal of Network Management 11, no. 3 (2001): 147–59. http://dx.doi.org/10.1002/nem.398.
Повний текст джерелаHima, Gabriella. "BIZTONSÁG ÉRTÉKE ÉS ÁRA." Economica 9, no. 2 (August 21, 2020): 1–6. http://dx.doi.org/10.47282/economica/2018/9/2/4128.
Повний текст джерелаHima, Gabriella. "BIZTONSÁG ÉRTÉKE ÉS ÁRA." Economica 9, no. 2 (August 21, 2020): 1–6. http://dx.doi.org/10.47282/economica/2018/9/2/4128.
Повний текст джерелаBartos, Karel, and Martin Rehak. "IFS: Intelligent flow sampling for network security-an adaptive approach." International Journal of Network Management 25, no. 5 (July 7, 2015): 263–82. http://dx.doi.org/10.1002/nem.1902.
Повний текст джерелаKaur, Rajbir, Navroop Kaur, and Sandeep K. Sood. "Security in IoT network based on stochastic game net model." International Journal of Network Management 27, no. 4 (May 8, 2017): e1975. http://dx.doi.org/10.1002/nem.1975.
Повний текст джерелаPeterson, Dale G. "A new era in data network security: Protocol-sensitive encryption." International Journal of Network Management 5, no. 4 (July 1995): 214–18. http://dx.doi.org/10.1002/nem.4560050410.
Повний текст джерелаHeld, Gilbert. "Focus on the Asanté FriendlyNet VR2004 Series VPN Security Router." International Journal of Network Management 13, no. 6 (November 2003): 427–32. http://dx.doi.org/10.1002/nem.498.
Повний текст джерелаHuy, Hà Triệu. "POLITICAL AND SECURITY COOPERATION BETWEEN VIETNAM AND ASEAN (2007-2021): ACHIEVEMENTS AND PROSPECTS." Tạp chí Khoa học 19, no. 1 (February 10, 2022): 1. http://dx.doi.org/10.54607/hcmue.js.19.1.3346(2022).
Повний текст джерелаHoang, Thi Tue Phuong. "Protection for Trafficked Persons in Viet Nam: Another National Security Discourse?" International Migration 53, no. 4 (February 6, 2015): 25–36. http://dx.doi.org/10.1111/imig.12189.
Повний текст джерелаDabbebi, Oussema, Remi Badonnel, and Olivier Festor. "Leveraging countermeasures as a service for VoIP security in the cloud." International Journal of Network Management 24, no. 1 (December 25, 2013): 70–84. http://dx.doi.org/10.1002/nem.1853.
Повний текст джерелаKao, Shang-Juh, and Lai-Ming Shiue. "Security management of mutually trusted domains through cooperation of defensive technologies." International Journal of Network Management 19, no. 3 (May 2009): 183–201. http://dx.doi.org/10.1002/nem.697.
Повний текст джерелаSmith, Libby, and John Morck. "The North Carolina Department of Commerce: A Healthy Workforce Promotes Economic Security." North Carolina Medical Journal 73, no. 4 (July 2012): 278–80. http://dx.doi.org/10.18043/ncm.73.4.278.
Повний текст джерелаHoy, Mariea Grubbs, and Joseph Phelps. "Online privacy and security practices of the 100 largest US nonprofit organizations." International Journal of Nonprofit and Voluntary Sector Marketing 14, no. 1 (February 2009): 71–82. http://dx.doi.org/10.1002/nvsm.344.
Повний текст джерелаPandey, Divya, and Vandana Kushwaha. "The use of Analytical Hierarchy Process in sensor-based networks for security-aware congestion control." Networks and Heterogeneous Media 18, no. 1 (2022): 244–74. http://dx.doi.org/10.3934/nhm.2023009.
Повний текст джерелаRistov, Pančo, Ante Mrvica, and Pavao Komadina. "Security of Data and Information in Vessel Traffic Management Information Systems." Naše more 63, no. 1 (March 2016): 1–8. http://dx.doi.org/10.17818/nm/2016/1.7.
Повний текст джерелаŽURGA, VIDA. "NOVA SODOBNA GROŽNJA NACIONALNI VARNOSTI – PRORAČUNSKA GROŽNJA." REPUBLIKA SLOVENIJA – PRVIH SAMOSTOJNIH PETINDVAJSET LET V MEDNARODNEM VARNOSTNEM OKOLJU/ REPUBLIC OF SLOVENIA – THE FIRST TWENTY-FIVE YEARS OF INDEPENDENCE IN THE INTERNATIONAL SECURITY ENVIRONMENT, VOLUME 2016/ ISSUE 18/4 (October 30, 2016): 35–50. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.18.4.2.
Повний текст джерелаPham Ngoc NHAN and Le Tran Thanh Liem. "Plant Diversity And Food Security At Households In Mekong Delta – Viet Nam." ISPEC Journal of Agricultural Sciences 5, no. 4 (December 12, 2021): 965–76. http://dx.doi.org/10.46291/ispecjasvol5iss4pp965-976.
Повний текст джерелаPham Minh Dat et al.,, Pham Minh Dat et al ,. "Management, IT Security and Risk Management Issues in Viet Nam Tourism Industry." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 1463–70. http://dx.doi.org/10.24247/ijmperdjun2020130.
Повний текст джерелаRist, Carl. "Wealth and Health: Exploring Asset Poverty as a Key Measure of Financial Security." North Carolina Medical Journal 83, no. 1 (January 2022): 11–16. http://dx.doi.org/10.18043/ncm.83.1.11.
Повний текст джерелаSperotto, A., R. Hofstede, A. Dainotti, C. Schmitt, and G. Dreo Rodosek. "Special issue on measure, detect and mitigate-challenges and trends in network security." International Journal of Network Management 25, no. 5 (September 2015): 261–62. http://dx.doi.org/10.1002/nem.1905.
Повний текст джерелаAbdullah Marich Ali, Abdullah Marich Ali. "Network Security Management Using Ontology-Based Mobile Agents." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (January 12, 2012): 25–44. http://dx.doi.org/10.4197/comp.1-2.2.
Повний текст джерелаSaleem, Munazza, and Omar Masood. "Credit Risk Management Can Gear Up Bank Performance – Moderating Effect of Interest Rate in Developed Countries." iRASD Journal of Economics 5, no. 1 (March 25, 2023): 720–38. http://dx.doi.org/10.52131/joe.2023.0501.0111.
Повний текст джерелаSaleh, Mohammad Saad, Abdullah Alrabiah, and Saad Haj Bakry. "Using ISO 17799: 2005 information security management: a STOPE view with six sigma approach." International Journal of Network Management 17, no. 1 (June 5, 2006): 85–97. http://dx.doi.org/10.1002/nem.616.
Повний текст джерелаBeasley, Sarah. "Deliberate self harm in medium security." Nursing Management 6, no. 8 (December 1, 1999): 29–33. http://dx.doi.org/10.7748/nm.6.8.29.s18.
Повний текст джерела