Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Assertion Mining (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/177)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
175
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
assertion
6.
assertion candidate
7.
assertion checkers
8.
Assertion Minimization
9.
assertion qualification
10.
assertion sign
11.
assertion-based verification
12.
Husserl on inclusion and assertion
13.
Peirce on inclusion and assertion
14.
sheet of assertion
15.
ad-hoc sensor networks security
16.
association rule mining
17.
Australian mining industry
18.
Automatic Security Verification
19.
Blockchain security
20.
business process mining
21.
cache security
22.
communication system security
23.
comprehensive system of economic security
24.
computer security
25.
cooperative security dilemma
26.
cyber security
27.
cyber security education
28.
cyber security exercises
29.
cyber security monitoring
30.
cyber security strategies
31.
cyber-security
32.
data and information security
33.
data mining
34.
data mining and knowledge discovery
35.
data security
36.
data stream mining
37.
data-mining
38.
deep-sea mining
39.
development of security cameras
40.
digital security practices
41.
distributed data mining
42.
distributed data mining (DDM)
43.
drinking water security
44.
economic security
45.
economic security of enterprise
46.
educational data mining
47.
educational data-mining
48.
emotional security
49.
energy security
50.
energy security indicator
51.
Estonian information security standard
52.
European mining
53.
graded security
54.
hardware security
55.
hardware security primitive
56.
high level of security
57.
Homeland security
58.
human security
59.
informal mining
60.
information security
61.
information security and privacy
62.
initial level of security
63.
internal security
64.
international security
65.
investment and innovation security
66.
IPv6 security
67.
IT security
68.
IT security management
69.
job security
70.
knowledge discovery and data mining
71.
long-term security
72.
Maritime Security Operations Center (M-SOC)
73.
medium level of security
74.
metadata model for security measures
75.
metal mining
76.
Middle Eastern security
77.
mining
78.
mining block
79.
mining co- and by-products
80.
mining industry
81.
Mining life cycle
82.
mining line patterns from event logs
83.
mining losses
84.
mining organization
85.
mining patterns from event logs
86.
mining regulations
87.
mining technology
88.
mining waste
89.
mining waste management
90.
Mobile security
91.
national cyber security strategy
92.
national security
93.
NATO. Science for Peace and Security Program
94.
network security
95.
network security monitoring
96.
numerical association rule mining
97.
oil shale mining
98.
OSCE (Organization for Security and Co-operation in Europe)
99.
passenger’s security
100.
pattern mining for event logs
101.
pattern mining from event logs
102.
pattern mining from log files
103.
policy-based routing security
104.
political and security cultures
105.
post-mining land use
106.
post-quantum security
107.
power system security
108.
quantitative association rule mining
109.
quantitative security
110.
regional security
111.
RISC-V Security Verification
112.
room-and-pillar mining
113.
Safety and Security in Sea Transportation
114.
safety and security testing
115.
security
116.
security adaptation
117.
security alert prioritization
118.
security analysis
119.
security and justice (AFSJ)
120.
Security and political science
121.
security and privacy
122.
security and privacy in smart grids
123.
security closure
124.
Security Coverage
125.
security dataset
126.
security dilemma
127.
Security evaluation
128.
security evaluation instruments
129.
Security limitations
130.
security log analysis
131.
security management
132.
security model
133.
security monitoring
134.
security notion
135.
security objectives
136.
security of data
137.
security of supply
138.
security operation center
139.
security operations center
140.
security patterns
141.
security policy
142.
security problem definition
143.
security proof
144.
security protocols
145.
security requirements
146.
security requirements engineering
147.
security risk assessment
148.
security risk management
149.
security risks
150.
security science and technology
151.
security strategies
152.
security systems for military objects
153.
security testing
154.
security training
155.
security verification
156.
security-by-design
157.
selective mining
158.
social security planning
159.
societal security
160.
software security
161.
software security level
162.
software security subcharacteristics
163.
space mining
164.
sufficient level of security
165.
sustainable mining
166.
system of economic security
167.
system security
168.
terrorism security
169.
text mining
170.
transmission System Security
171.
underground mining
172.
web usage mining
173.
voting privacy and security
174.
vulnerability mining
175.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT