Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
RISC-V Security Verification (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/159)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
157
1.
RISC-V Security Verification
2.
Automatic Security Verification
3.
security verification
4.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
5.
RISC processor testing
6.
RISC processors
7.
RISC-V
8.
RISC-V Processor
9.
RISC-V processors
10.
assertion-based verification
11.
Automata, Formal Verification
12.
automatic speaker verification
13.
compliance verification
14.
compositional verification
15.
constraint random verification
16.
deductive verification
17.
extra-functional verification
18.
forecast verification
19.
formal verification
20.
functional verification
21.
grid verification
22.
Hardware Verification
23.
model verification
24.
model-based verification
25.
power verification
26.
program verification
27.
Quantum state verification
28.
reliability verification
29.
simple payment verification (SVP)
30.
simulation-based verification
31.
speaker verification
32.
timing verification
33.
validation and verification
34.
verification
35.
verification and validation
36.
verification by model checking
37.
verification methods
38.
ad-hoc sensor networks security
39.
Blockchain security
40.
cache security
41.
cloud security
42.
communication system security
43.
comprehensive system of economic security
44.
computer security
45.
cooperative security dilemma
46.
cyber security
47.
cyber security education
48.
cyber security exercises
49.
cyber security monitoring
50.
cyber security strategies
51.
cyber-security
52.
data and information security
53.
data security
54.
development of security cameras
55.
digital security practices
56.
drinking water security
57.
economic security
58.
economic security of enterprise
59.
emotional security
60.
energy security
61.
energy security indicator
62.
Estonian information security standard
63.
graded security
64.
hardware security
65.
hardware security primitive
66.
high level of security
67.
Homeland security
68.
human security
69.
information security
70.
information security and privacy
71.
initial level of security
72.
internal security
73.
international security
74.
investment and innovation security
75.
IPv6 security
76.
IT security
77.
IT security management
78.
job security
79.
long-term security
80.
maritime cyber security
81.
maritime cyber security operations centers
82.
Maritime Security Operations Center (M-SOC)
83.
medium level of security
84.
metadata model for security measures
85.
Middle Eastern security
86.
Mobile security
87.
national cyber security strategy
88.
national security
89.
NATO. Science for Peace and Security Program
90.
network security
91.
network security monitoring
92.
OSCE (Organization for Security and Co-operation in Europe)
93.
passenger’s security
94.
policy-based routing security
95.
political and security cultures
96.
post-quantum security
97.
power system security
98.
quantitative security
99.
regional security
100.
Safety and Security in Sea Transportation
101.
safety and security testing
102.
security
103.
security adaptation
104.
security alert prioritization
105.
security analysis
106.
security and justice (AFSJ)
107.
Security and political science
108.
security and privacy
109.
security and privacy in smart grids
110.
Security Assertion
111.
Security Assertion Mining
112.
security closure
113.
Security Coverage
114.
security dataset
115.
security dilemma
116.
Security evaluation
117.
security evaluation instruments
118.
Security Level Evaluation
119.
Security limitations
120.
security log analysis
121.
security management
122.
security model
123.
security monitoring
124.
security notion
125.
security objectives
126.
security of data
127.
security of supply
128.
security operation center
129.
security operations center
130.
security patterns
131.
security policy
132.
security problem definition
133.
security proof
134.
security protocols
135.
security requirements
136.
security requirements engineering
137.
security research
138.
security risk assessment
139.
security risk management
140.
security risks
141.
security science and technology
142.
security strategies
143.
security systems for military objects
144.
security testing
145.
security training
146.
security-by-design
147.
social security planning
148.
societal security
149.
software security
150.
software security level
151.
software security subcharacteristics
152.
sufficient level of security
153.
system of economic security
154.
system security
155.
terrorism security
156.
transmission System Security
157.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT