Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Automatic Security Verification (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/189)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
187
1.
Automatic Security Verification
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
automatic speaker verification
4.
RISC-V Security Verification
5.
security verification
6.
assertion-based verification
7.
Automata, Formal Verification
8.
compliance verification
9.
compositional verification
10.
constraint random verification
11.
deductive verification
12.
extra-functional verification
13.
forecast verification
14.
formal verification
15.
functional verification
16.
grid verification
17.
Hardware Verification
18.
independent verification and validation
19.
model verification
20.
model-based verification
21.
power verification
22.
program verification
23.
Quantum state verification
24.
reliability verification
25.
safety verification
26.
simple payment verification (SVP)
27.
simulation-based verification
28.
speaker verification
29.
timing verification
30.
validation and verification
31.
verification
32.
verification and validation
33.
verification by model checking
34.
verification methods
35.
automatic AI (autoAI)
36.
automatic assertion mining
37.
automatic calibration
38.
automatic clutch engagement
39.
automatic code generation
40.
automatic composition method
41.
automatic control
42.
automatic control systems
43.
automatic controllers
44.
automatic error correction
45.
automatic evaluation
46.
automatic fault diagnosis
47.
automatic frequency control
48.
Automatic generation control
49.
automatic GUI model generation
50.
Automatic identification system
51.
automatic identification system (AIS)
52.
automatic machine learning (autoML)
53.
automatic model creation
54.
automatic processing of solutions
55.
automatic program synthesis
56.
automatic programming
57.
automatic speech recognition
58.
automatic test case generation
59.
automatic test pattern generation
60.
automatic test program generation
61.
automatic tide gauges
62.
automatic weather stations
63.
automatic voltage control
64.
DLL for automatic calibration
65.
Speaker-attributed automatic speech
66.
ad-hoc sensor networks security
67.
Blockchain security
68.
cache security
69.
cloud security
70.
communication system security
71.
comprehensive system of economic security
72.
computer security
73.
cooperative security dilemma
74.
cyber security
75.
cyber security education
76.
cyber security exercises
77.
cyber security monitoring
78.
cyber security monitoring in maritime
79.
cyber security strategies
80.
cyber-physical system security
81.
cyber-security
82.
data and information security
83.
data security
84.
development of security cameras
85.
digital security practices
86.
drinking water security
87.
economic security
88.
economic security of enterprise
89.
emotional security
90.
energy security
91.
energy security indicator
92.
Estonian information security standard
93.
graded security
94.
hardware security
95.
hardware security primitive
96.
high level of security
97.
Homeland security
98.
human security
99.
information security
100.
information security and privacy
101.
initial level of security
102.
internal security
103.
international security
104.
investment and innovation security
105.
IPv6 security
106.
IT security
107.
IT security management
108.
job security
109.
long-term security
110.
maritime cyber security
111.
maritime cyber security operations centers
112.
Maritime Security Operations Center (M-SOC)
113.
medium level of security
114.
metadata model for security measures
115.
Middle Eastern security
116.
Mobile security
117.
national cyber security strategy
118.
national security
119.
NATO. Science for Peace and Security Program
120.
network security
121.
network security monitoring
122.
OSCE (Organization for Security and Co-operation in Europe)
123.
passenger’s security
124.
policy-based routing security
125.
political and security cultures
126.
post-quantum security
127.
power system security
128.
quantitative security
129.
regional security
130.
Safety and Security in Sea Transportation
131.
safety and security testing
132.
security
133.
security adaptation
134.
security alert prioritization
135.
security analysis
136.
security and justice (AFSJ)
137.
Security and political science
138.
security and privacy
139.
security and privacy in smart grids
140.
Security Assertion
141.
Security Assertion Mining
142.
security closure
143.
Security Coverage
144.
security dataset
145.
security dilemma
146.
Security evaluation
147.
security evaluation instruments
148.
Security Level Evaluation
149.
Security limitations
150.
security log analysis
151.
security management
152.
security model
153.
security monitoring
154.
security notion
155.
security objectives
156.
security of data
157.
security of supply
158.
security operation center
159.
security operations center
160.
security patterns
161.
security policy
162.
security problem definition
163.
security proof
164.
security protocols
165.
security requirements
166.
security requirements engineering
167.
security research
168.
security risk assessment
169.
security risk management
170.
security risks
171.
security science and technology
172.
security strategies
173.
security systems for military objects
174.
security testing
175.
security training
176.
security-by-design
177.
social security planning
178.
societal security
179.
software security
180.
software security level
181.
software security subcharacteristics
182.
sufficient level of security
183.
system of economic security
184.
system security
185.
terrorism security
186.
transmission System Security
187.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT