Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
RISC-V Security Verification (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/152)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
150
1.
RISC-V Security Verification
2.
Automatic Security Verification
3.
security verification
4.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
5.
RISC processor testing
6.
RISC processors
7.
RISC-V
8.
RISC-V processors
9.
assertion-based verification
10.
Automata, Formal Verification
11.
automatic speaker verification
12.
compliance verification
13.
compositional verification
14.
constraint random verification
15.
deductive verification
16.
extra-functional verification
17.
forecast verification
18.
formal verification
19.
functional verification
20.
grid verification
21.
Hardware Verification
22.
model verification
23.
model-based verification
24.
power verification
25.
program verification
26.
Quantum state verification
27.
reliability verification
28.
simple payment verification (SVP)
29.
simulation-based verification
30.
speaker verification
31.
timing verification
32.
validation and verification
33.
verification
34.
verification and validation
35.
verification by model checking
36.
verification methods
37.
ad-hoc sensor networks security
38.
Blockchain security
39.
cache security
40.
communication system security
41.
comprehensive system of economic security
42.
computer security
43.
cooperative security dilemma
44.
cyber security
45.
cyber security education
46.
cyber security exercises
47.
cyber security monitoring
48.
cyber security strategies
49.
cyber-security
50.
data and information security
51.
data security
52.
development of security cameras
53.
digital security practices
54.
drinking water security
55.
economic security
56.
economic security of enterprise
57.
emotional security
58.
energy security
59.
energy security indicator
60.
Estonian information security standard
61.
graded security
62.
hardware security
63.
hardware security primitive
64.
high level of security
65.
Homeland security
66.
human security
67.
information security
68.
information security and privacy
69.
initial level of security
70.
internal security
71.
international security
72.
investment and innovation security
73.
IPv6 security
74.
IT security
75.
IT security management
76.
job security
77.
long-term security
78.
Maritime Security Operations Center (M-SOC)
79.
medium level of security
80.
metadata model for security measures
81.
Middle Eastern security
82.
Mobile security
83.
national cyber security strategy
84.
national security
85.
NATO. Science for Peace and Security Program
86.
network security
87.
network security monitoring
88.
OSCE (Organization for Security and Co-operation in Europe)
89.
passenger’s security
90.
policy-based routing security
91.
political and security cultures
92.
post-quantum security
93.
power system security
94.
quantitative security
95.
regional security
96.
Safety and Security in Sea Transportation
97.
safety and security testing
98.
security
99.
security adaptation
100.
security alert prioritization
101.
security analysis
102.
security and justice (AFSJ)
103.
Security and political science
104.
security and privacy
105.
security and privacy in smart grids
106.
Security Assertion Mining
107.
security closure
108.
Security Coverage
109.
security dataset
110.
security dilemma
111.
Security evaluation
112.
security evaluation instruments
113.
Security limitations
114.
security log analysis
115.
security management
116.
security model
117.
security monitoring
118.
security notion
119.
security objectives
120.
security of data
121.
security of supply
122.
security operation center
123.
security operations center
124.
security patterns
125.
security policy
126.
security problem definition
127.
security proof
128.
security protocols
129.
security requirements
130.
security requirements engineering
131.
security risk assessment
132.
security risk management
133.
security risks
134.
security science and technology
135.
security strategies
136.
security systems for military objects
137.
security testing
138.
security training
139.
security-by-design
140.
social security planning
141.
societal security
142.
software security
143.
software security level
144.
software security subcharacteristics
145.
sufficient level of security
146.
system of economic security
147.
system security
148.
terrorism security
149.
transmission System Security
150.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT