Academic literature on the topic 'Memory security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Memory security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Memory security"
Apryshchenko, V. Yu. "Memory as Security." New Past, no. 3 (2016): 86–108. http://dx.doi.org/10.18522/2500-3224-2016-3-86-108.
Full textSha, Mo, Yifan Cai, Sheng Wang, Linh Thi Xuan Phan, Feifei Li, and Kian-Lee Tan. "Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures." Proceedings of the ACM on Management of Data 2, no. 3 (2024): 1–29. http://dx.doi.org/10.1145/3654958.
Full textLescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Full textYuliana, Mike, Nuril Hidayah, and Amang Sudarsono. "Implementation of Web-Based File Sharing Security System." MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering 6, no. 1 (2024): 41–52. http://dx.doi.org/10.46574/motivection.v6i1.314.
Full textYounan, Yves, Wouter Joosen, Frank Piessens, and Hans Van den Eynden. "Improving Memory Management Security for C and C++." International Journal of Secure Software Engineering 1, no. 2 (2010): 57–82. http://dx.doi.org/10.4018/jsse.2010040104.
Full textCrenne, Jérémie, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, and Deepak Unnikrishnan. "Configurable memory security in embedded systems." ACM Transactions on Embedded Computing Systems 12, no. 3 (2013): 1–23. http://dx.doi.org/10.1145/2442116.2442121.
Full textGustafsson, Karl, and Maria Mälksoo. "Memory-Political Deterrence: Shielding Collective Memory and Ontological Security through Dissuasion." International Studies Quarterly 68, no. 1 (2024): 1–12. https://doi.org/10.1093/isq/sqae006.
Full textLee, Jinjae, Derry Pratama, Minjae Kim, Howon Kim, and Donghyun Kwon. "CoMeT: Configurable Tagged Memory Extension." Sensors 21, no. 22 (2021): 7771. http://dx.doi.org/10.3390/s21227771.
Full textToymentsev, Sergey. "Russia's Historical Memory: Strict-Security or Hybrid?" Ab Imperio 2013, no. 2 (2013): 336–45. http://dx.doi.org/10.1353/imp.2013.0042.
Full textEnglish, Erin. "New PCMCIA card offers security and memory." Computer Fraud & Security Bulletin 1995, no. 3 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80128-6.
Full textDissertations / Theses on the topic "Memory security"
Talhi, Chamseddine. "Memory-Constrained Security Enforcement." Doctoral thesis, Québec : Université Laval, 2007. http://www.theses.ulaval.ca/2007/24434/24434.pdf.
Full textCadar, Cristian. "Enhancing availability and security through boundless memory blocks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/33123.
Full textChuang, Weihaw. "Maintaining safe memory for security, debugging, and multi-threading." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3223012.
Full textSylve, Joseph T. "Android Memory Capture and Applications for Security and Privacy." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1400.
Full textMarco, Gisbert Héctor. "Cyber-security protection techniques to mitigate memory errors exploitation." Doctoral thesis, Universitat Politècnica de València, 2016. http://hdl.handle.net/10251/57806.
Full textGovindaraj, Rekha. "Emerging Non-Volatile Memory Technologies for Computing and Security." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7674.
Full textVeca, Matthew. "Extracting Windows event logs using memory forensics." ScholarWorks@UNO, 2015. http://scholarworks.uno.edu/td/2119.
Full textBabecki, Christopher. "A Memory-Array Centric Reconfigurable Hardware Accelerator for Security Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427381331.
Full textPettersson, Stefan. "Visualizing Endpoint Security Technologies using Attack Trees." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-15509.
Full textPayne, Bryan D. "Improving host-based computer security using secure active monitoring and memory analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34852.
Full textBooks on the topic "Memory security"
Oualha, Nouha. Peer-to-peer storage: Security and protocols. Nova Science Publishers, 2010.
Find full textMichael, Leifer, Liow Joseph Chin Yong, and Emmers Ralf 1974-, eds. Order and security in Southeast Asia: Essays in memory of Michael Leifer. Routledge, 2005.
Find full textJan, Rohwerder, and Volk Christian, eds. Junge politikwissenschaftliche Perspektiven: Dokumentation der Aachener Herbstgespräche. Kovac̆, 2009.
Find full textPreston, Catherine L. In retrospect: The construction and communication of a national visual memory. C.L. Preston, 1995.
Find full textCenter for Evaluative and Developmental Research (Aldershot, England), ed. Narrative identity and dementia: A study of autobiographical memories and emotions. Ashgate, 1998.
Find full textRai, I. Dewa Putu. Memori jabatan Deputi Bidang Politik, Hukum, Pertahanan, dan Keamanan. Kantor Menteri Negara Perencanaan Pembangunan Nasional/Badan Perencanaan Pembangunan Nasional, 2008.
Find full textSy Savané, Alpha Omar, $4d 1953-. La Guinée, membre permanent du Conseil de sécurité des Nations Unies. L'Harmattan, 2014.
Find full textWatanabe, Yasushi. Handbook of Cultural Security. Elgar Publishing Limited, Edward, 2018.
Find full textLawler, Peter, Charlotte Heath-Kelly, and Emmanuel Pierre Guittet. Death and Security: Memory and Mortality at the Bombsite. Manchester University Press, 2016.
Find full textBook chapters on the topic "Memory security"
Balasubramonian, Rajeev. "Memory Security." In Innovations in the Memory System. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-031-01763-6_11.
Full textHelfrich, James. "Memory Injection." In Security for Software Engineers. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-11.
Full textShi, Weidong, Chenghuai Lu, and Hsien-Hsin S. Lee. "Memory-Centric Security Architecture." In High Performance Embedded Architectures and Compilers. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11587514_11.
Full textShi, Weidong, Chenghuai Lu, and Hsien-Hsin S. Lee. "Memory-Centric Security Architecture." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71528-3_7.
Full textSilvestri, Lisa. "Memory, Security, and Communication." In The Handbook of Communication and Security. Routledge, 2019. http://dx.doi.org/10.4324/9781351180962-18.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Volatile Memory-Based PUF." In Hardware Security Primitives. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_4.
Full textAdiguzel, O. "Thermal Memory and Thermal Induced Phase Transformation in Shape Memory Alloys." In Nanomaterials for Security. Springer Netherlands, 2016. http://dx.doi.org/10.1007/978-94-017-7593-9_11.
Full textBae, Seungyeon, Taehun Kim, Woomin Lee, and Youngjoo Shin. "Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack." In Information Security Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-8024-6_19.
Full textNovković, Bojan, and Marin Golub. "SoK: Secure Memory Allocation." In Cryptology and Network Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92548-2_20.
Full textGotfryd, Karol, Paweł Lorek, and Filip Zagórski. "RiffleScrambler – A Memory-Hard Password Storing Function." In Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_16.
Full textConference papers on the topic "Memory security"
Gorter, Floris, Taddeus Kroes, Herbert Bos, and Cristiano Giuffrida. "Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00263.
Full textAjmi, Hala, Fakhreddine Zayer, and Hamdi Belgacem. "In-Memory Computing Architecture for Efficient Hardware Security." In 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP). IEEE, 2024. http://dx.doi.org/10.1109/atsip62566.2024.10638850.
Full textKim, Minjung, and Daejin Park. "Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code." In 2024 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2024. http://dx.doi.org/10.1109/dsc63325.2024.00028.
Full textVintila, Emanuel Q., Philipp Zieris, and Julian Horsch. "Evaluating the Effectiveness of Memory Safety Sanitizers." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00088.
Full textHong, Junwha, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, and Yuseok Jeon. "CMASan: Custom Memory Allocator-Aware Address Sanitizer." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00110.
Full textHong, Junwha, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, and Yuseok Jeon. "CMASan: Custom Memory Allocator-aware Address Sanitizer." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00074.
Full textJones, Katharine J. "Wavelet-based associative memory." In Defense and Security, edited by Harold H. Szu, Mladen V. Wickerhauser, Barak A. Pearlmutter, and Wim Sweldens. SPIE, 2004. http://dx.doi.org/10.1117/12.541566.
Full textS, Karthika, and Kavitha A. "Cloud Memory Management with Hybrid Algorithms." In International Conference on Recent Trends in Computing & Communication Technologies (ICRCCT’2K24). International Journal of Advanced Trends in Engineering and Management, 2024. http://dx.doi.org/10.59544/hvrr2284/icrcct24p146.
Full textHashimoto, Mikio. "Overview of Memory Security Technologies." In 2021 International Symposium on VLSI Technology, Systems and Applications (VLSI-TSA). IEEE, 2021. http://dx.doi.org/10.1109/vlsi-tsa51926.2021.9440133.
Full textFalk, Heiko. "Session details: Security in memory." In ESWEEK'12: Eighth Embedded System Week. ACM, 2012. http://dx.doi.org/10.1145/3250258.
Full textReports on the topic "Memory security"
Pinkerton, J., and E. Deleganes. Direct Data Placement Protocol (DDP) / Remote Direct Memory Access Protocol (RDMAP) Security. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5042.
Full textBikova, E. V. Energy Security and Controlled Power Transimissions, issue 13(28), Proceedings-2022, in memory of academician Postolati V.M. DOI СODE, 2022. http://dx.doi.org/10.18411/doicode-2023.114.
Full textPasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Full textBeer, Richard C. Memo to the President-Elect: An Alternative National Security Strategy for the 21st Century. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada432150.
Full text