Journal articles on the topic 'Memory security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Memory security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Apryshchenko, V. Yu. "Memory as Security." New Past, no. 3 (2016): 86–108. http://dx.doi.org/10.18522/2500-3224-2016-3-86-108.
Full textSha, Mo, Yifan Cai, Sheng Wang, Linh Thi Xuan Phan, Feifei Li, and Kian-Lee Tan. "Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures." Proceedings of the ACM on Management of Data 2, no. 3 (2024): 1–29. http://dx.doi.org/10.1145/3654958.
Full textLescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Full textYuliana, Mike, Nuril Hidayah, and Amang Sudarsono. "Implementation of Web-Based File Sharing Security System." MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering 6, no. 1 (2024): 41–52. http://dx.doi.org/10.46574/motivection.v6i1.314.
Full textYounan, Yves, Wouter Joosen, Frank Piessens, and Hans Van den Eynden. "Improving Memory Management Security for C and C++." International Journal of Secure Software Engineering 1, no. 2 (2010): 57–82. http://dx.doi.org/10.4018/jsse.2010040104.
Full textCrenne, Jérémie, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, and Deepak Unnikrishnan. "Configurable memory security in embedded systems." ACM Transactions on Embedded Computing Systems 12, no. 3 (2013): 1–23. http://dx.doi.org/10.1145/2442116.2442121.
Full textGustafsson, Karl, and Maria Mälksoo. "Memory-Political Deterrence: Shielding Collective Memory and Ontological Security through Dissuasion." International Studies Quarterly 68, no. 1 (2024): 1–12. https://doi.org/10.1093/isq/sqae006.
Full textLee, Jinjae, Derry Pratama, Minjae Kim, Howon Kim, and Donghyun Kwon. "CoMeT: Configurable Tagged Memory Extension." Sensors 21, no. 22 (2021): 7771. http://dx.doi.org/10.3390/s21227771.
Full textToymentsev, Sergey. "Russia's Historical Memory: Strict-Security or Hybrid?" Ab Imperio 2013, no. 2 (2013): 336–45. http://dx.doi.org/10.1353/imp.2013.0042.
Full textEnglish, Erin. "New PCMCIA card offers security and memory." Computer Fraud & Security Bulletin 1995, no. 3 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80128-6.
Full textCarboni, Roberto, and Daniele Ielmini. "Stochastic Memory Devices for Security and Computing." Advanced Electronic Materials 5, no. 9 (2019): 1900198. http://dx.doi.org/10.1002/aelm.201900198.
Full textChien, Jason. "Meeting the Memory Challenge." New Electronics 54, no. 15 (2021): 18–22. http://dx.doi.org/10.12968/s0047-9624(22)60520-0.
Full textHarum, Dana Putri, Aminudin Aminudin, and Sofyan Arifianto. "Improvisasi algoritma advanced encryption standard (AES) dengan melakukan pemetaan s-box pada modifikasi mixcolumns." Jurnal Repositor 1, no. 2 (2019): 95. http://dx.doi.org/10.22219/repositor.v1i2.813.
Full textJagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.
Full textTahir, Shahzaib, Hasan Tahir, Ruhma Tahir, Muttukrishnan Rajarajan, and Haider Abbas. "Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint." Electronics 11, no. 5 (2022): 818. http://dx.doi.org/10.3390/electronics11050818.
Full textGordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.
Full textYan, Pengbo, and Toby Murray. "SecRSL: security separation logic for C11 release-acquire concurrency." Proceedings of the ACM on Programming Languages 5, OOPSLA (2021): 1–26. http://dx.doi.org/10.1145/3485476.
Full textAkdemir, Bayram, and Hasan Üzülmez. "Providing Security of Vital Data for Conventional Microcontroller Applications." Applied Mechanics and Materials 789-790 (September 2015): 1059–66. http://dx.doi.org/10.4028/www.scientific.net/amm.789-790.1059.
Full textSepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.
Full textRahman, Nashrullah Mujibur, Didik Tristianto, and Slamet Winardi. "Design and Build Security for Opening and Closing a House Fence using a Microcontroller-Based Remote Control." Natural Sciences Engineering and Technology Journal 1, no. 2 (2021): 54–57. http://dx.doi.org/10.37275/nasetjournal.v1i2.10.
Full textSevastianova, Yaroslava, and Dmitriy Efremenko. "Securitization of memory and dilemma of mnemonic security." Political Science (RU), no. 2 (2020): 66–86. http://dx.doi.org/10.31249/poln/2020.02.03.
Full textDavies, Nigel, Adrian Friday, Sarah Clinch, et al. "Security and Privacy Implications of Pervasive Memory Augmentation." IEEE Pervasive Computing 14, no. 1 (2015): 44–53. http://dx.doi.org/10.1109/mprv.2015.13.
Full textWang, Xueyan, Jienlei Yang, Yinglin Zhao, Xiaotao Jia, Gang Qu, and Weisheng Zhao. "Hardware Security in Spin-based Computing-in-memory." ACM Journal on Emerging Technologies in Computing Systems 16, no. 4 (2020): 1–18. http://dx.doi.org/10.1145/3397513.
Full textBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Full textWu, Jin, and Yi Huai Wang. "Protection Mechanisms and Security Operations of XS128 Flash Memory." Advanced Materials Research 403-408 (November 2011): 1767–71. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1767.
Full textDruchek, Olena. "HISTORICAL (NATIONAL) MEMORY POLICY IN THE CONTEXT OF SECURITY PROBLEMS IN UKRAINE." Науковий вісник Київського інституту Національної гвардії України, no. 1 (June 30, 2025): 151–59. https://doi.org/10.59226/2786-6920.1.2025.151-159.
Full textWang, Jian, and Ying Li. "RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection." Information 12, no. 4 (2021): 169. http://dx.doi.org/10.3390/info12040169.
Full textJagiełło-Szostak, Anna. "Links between foreign and security policy and historical memory: the case of Serbia – Kosovo relations." Rocznik Instytutu Europy Środkowo-Wschodniej 18, no. 2 (2020): 59–84. http://dx.doi.org/10.36874/riesw.2020.2.3.
Full textVellanki, Ravi Babu. "PostgreSQL Configuration: Best Practices for Performance and Security." European Journal of Computer Science and Information Technology 13, no. 47 (2025): 172–82. https://doi.org/10.37745/ejcsit.2013/vol13n47172182.
Full textJIBIN JOY and Dr. S. Devaraju. "AVOIDANCE OF DUPLICACY AND COMPELLING CLOUD SECURITY INDIFFERENT CLOUD SITUATIONS." INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS 11, no. 11 (2023): a543—a555. http://dx.doi.org/10.56975/1k890v13.
Full textYahia, Alemami, M. Al-Ghonmein Ali, G. Al-Moghrabi Khaldun, and Afendee Mohamed Mohamad. "Cloud data security and various cryptographic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1867–79. https://doi.org/10.11591/ijece.v13i2.pp1867-1879.
Full textWidya Dwi Agustin, A. Dhyta Maulana, Dede Wirta, and Didik Aribowo. "Studi Perbandingan Antara Memori DRAM dan Memori SRAM Dalam Sistem Keamanan Komputer." Jurnal Teknik Mesin, Industri, Elektro dan Informatika 2, no. 4 (2023): 01–10. http://dx.doi.org/10.55606/jtmei.v2i4.2747.
Full textDener, Murat. "Comparison of Encryption Algorithms in Wireless Sensor Networks." ITM Web of Conferences 22 (2018): 01005. http://dx.doi.org/10.1051/itmconf/20182201005.
Full textMamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Full textPakhomenko, Sergii, and Olga Sarajeva. "Securitization of Memory: a Theoretical Framework to Study the Latvian Case." Przegląd Strategiczny, no. 13 (December 31, 2020): 395–410. http://dx.doi.org/10.14746/ps.2020.1.24.
Full textGustafsson, Karl. "International reconciliation on the Internet? Ontological security, attribution and the construction of war memory narratives in Wikipedia." International Relations 34, no. 1 (2019): 3–24. http://dx.doi.org/10.1177/0047117819864410.
Full textAl-Ameen, Mahdi Nasrullah, S. M. Taiabul Haque, and Matthew Wright. "Leveraging autobiographical memory for two-factor online authentication." Information & Computer Security 24, no. 4 (2016): 386–99. http://dx.doi.org/10.1108/ics-01-2016-0005.
Full textRimaitė-Beržiūnienė, Viktorija. "Visual Securitization: Commemorating the Partisan War in Lithuanian Foreign and Security Policy." Politologija 106, no. 2 (2022): 11–52. http://dx.doi.org/10.15388/polit.2022.106.1.
Full textAlemami, Yahia, Ali M. Al-Ghonmein, Khaldun G. Al-Moghrabi, and Mohamad Afendee Mohamed. "Cloud data security and various cryptographic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1867. http://dx.doi.org/10.11591/ijece.v13i2.pp1867-1879.
Full textMufidah, Nada Fajri, and Hilal Hudan Nuha. "Performance and Security Analysis of Lightweight Hash Functions in IoT." Jurnal Informatika: Jurnal Pengembangan IT 9, no. 3 (2024): 264–70. https://doi.org/10.30591/jpit.v9i3.7633.
Full textGustafsson, Karl. "Memory Politics and Ontological Security in Sino-Japanese Relations." Asian Studies Review 38, no. 1 (2013): 71–86. http://dx.doi.org/10.1080/10357823.2013.852156.
Full textIyengar, Anirudh Srikant, Swaroop Ghosh, and Kenneth Ramclam. "Domain Wall Magnets for Embedded Memory and Hardware Security." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5, no. 1 (2015): 40–50. http://dx.doi.org/10.1109/jetcas.2015.2398232.
Full textMahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.
Full textAlshannaq, Osama, Mohd Rizuan Baharon, Jamil Abedalrahim Jamil Alsayaydeh, et al. "Analysis of the Lowest Memory Consumption (Memory Usage) Through Running Different Cryptography Techniques for Different Types of Images." Journal of Physics: Conference Series 2319, no. 1 (2022): 012027. http://dx.doi.org/10.1088/1742-6596/2319/1/012027.
Full textKrishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.
Full textLi, Sijia, Zhiyi Liao, Zhengyang Wu, Zheng Wu, and Lin Ding. "(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher." Symmetry 14, no. 6 (2022): 1127. http://dx.doi.org/10.3390/sym14061127.
Full textBonchev, Miroslav. "Atomic Memory Model." Mathematics, Computer Science and Education 7, no. 2 (2024): 83–93. https://doi.org/10.54664/fpky9556.
Full textC. Visalatchi. "Enhancing Network Security in Wireless Sensor Networks through Rsa-Based Secure Memory Management and Optimized Resource Allocation: A Comprehensive Survey." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 2777–97. https://doi.org/10.52783/cana.v32.4555.
Full textElamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.
Full textStark, Samuel W., A. Theodore Markettos, and Simon W. Moore. "How Flexible is CXL's Memory Protection?" Queue 21, no. 3 (2023): 54–64. http://dx.doi.org/10.1145/3606014.
Full text