Security Refresh: Protecting Phase-Change Memory against Malicious Wear Out.
Nak Hee SeongDong Hyuk WooHsien-Hsin S. LeePublished in: IEEE Micro (2011)
Keyphrases
- access control
- information security
- inference control
- malicious users
- security issues
- malicious attacks
- privacy issues
- security mechanisms
- data protection
- memory usage
- information systems
- security requirements
- security policies
- memory requirements
- intrusion detection
- key management
- memory space
- data security
- data structure
- malicious activities
- protection mechanisms
- biometric systems
- rfid tags
- computer security
- cyber security
- neural network
- detect malicious