Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Assertion Mining (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/169)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
167
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
assertion
6.
assertion candidate
7.
assertion checkers
8.
Assertion Minimization
9.
assertion qualification
10.
assertion sign
11.
assertion-based verification
12.
Husserl on inclusion and assertion
13.
Peirce on inclusion and assertion
14.
sheet of assertion
15.
ad-hoc sensor networks security
16.
association rule mining
17.
Australian mining industry
18.
Automatic Security Verification
19.
Blockchain security
20.
business process mining
21.
cache security
22.
communication system security
23.
comprehensive system of economic security
24.
computer security
25.
cooperative security dilemma
26.
cyber security
27.
cyber security education
28.
cyber security exercises
29.
cyber security monitoring
30.
cyber security strategies
31.
cyber-security
32.
data and information security
33.
data mining
34.
data mining and knowledge discovery
35.
data security
36.
data stream mining
37.
data-mining
38.
deep-sea mining
39.
development of security cameras
40.
digital security practices
41.
distributed data mining
42.
distributed data mining (DDM)
43.
drinking water security
44.
economic security
45.
economic security of enterprise
46.
educational data mining
47.
educational data-mining
48.
emotional security
49.
energy security
50.
energy security indicator
51.
Estonian information security standard
52.
European mining
53.
graded security
54.
hardware security
55.
hardware security primitive
56.
Homeland security
57.
human security
58.
informal mining
59.
information security
60.
information security and privacy
61.
internal security
62.
international security
63.
investment and innovation security
64.
IPv6 security
65.
IT security
66.
IT security management
67.
job security
68.
knowledge discovery and data mining
69.
long-term security
70.
metadata model for security measures
71.
metal mining
72.
Middle Eastern security
73.
mining
74.
mining block
75.
mining co- and by-products
76.
mining industry
77.
Mining life cycle
78.
mining line patterns from event logs
79.
mining losses
80.
mining organization
81.
mining patterns from event logs
82.
mining regulations
83.
mining technology
84.
mining waste
85.
mining waste management
86.
Mobile security
87.
national cyber security strategy
88.
national security
89.
NATO. Science for Peace and Security Program
90.
network security
91.
network security monitoring
92.
numerical association rule mining
93.
oil shale mining
94.
OSCE (Organization for Security and Co-operation in Europe)
95.
passenger’s security
96.
pattern mining for event logs
97.
pattern mining from event logs
98.
pattern mining from log files
99.
policy-based routing security
100.
political and security cultures
101.
post-mining land use
102.
post-quantum security
103.
power system security
104.
quantitative association rule mining
105.
quantitative security
106.
regional security
107.
RISC-V Security Verification
108.
room-and-pillar mining
109.
Safety and Security in Sea Transportation
110.
safety and security testing
111.
security
112.
security adaptation
113.
security alert prioritization
114.
security analysis
115.
security and justice (AFSJ)
116.
Security and political science
117.
security and privacy
118.
security and privacy in smart grids
119.
security closure
120.
Security Coverage
121.
security dataset
122.
security dilemma
123.
Security evaluation
124.
security evaluation instruments
125.
Security limitations
126.
security log analysis
127.
security management
128.
security model
129.
security monitoring
130.
security notion
131.
security objectives
132.
security of data
133.
security of supply
134.
security operation center
135.
security operations center
136.
security patterns
137.
security policy
138.
security problem definition
139.
security proof
140.
security protocols
141.
security requirements
142.
security requirements engineering
143.
security risk assessment
144.
security risk management
145.
security risks
146.
security science and technology
147.
security strategies
148.
security systems for military objects
149.
security testing
150.
security training
151.
security verification
152.
security-by-design
153.
selective mining
154.
social security planning
155.
societal security
156.
space mining
157.
sustainable mining
158.
system of economic security
159.
system security
160.
terrorism security
161.
text mining
162.
transmission System Security
163.
underground mining
164.
web usage mining
165.
voting privacy and security
166.
vulnerability mining
167.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT