Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Assertion Mining (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/184)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
182
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
Security Assertion
6.
assertion
7.
assertion candidate
8.
assertion checkers
9.
Assertion Minimization
10.
assertion qualification
11.
assertion sign
12.
assertion-based verification
13.
Husserl on inclusion and assertion
14.
Peirce on inclusion and assertion
15.
sheet of assertion
16.
ad-hoc sensor networks security
17.
association rule mining
18.
Australian mining industry
19.
Automatic Security Verification
20.
Blockchain security
21.
business process mining
22.
cache security
23.
cloud security
24.
communication system security
25.
comprehensive system of economic security
26.
computer security
27.
cooperative security dilemma
28.
cyber security
29.
cyber security education
30.
cyber security exercises
31.
cyber security monitoring
32.
cyber security strategies
33.
cyber-physical system security
34.
cyber-security
35.
data and information security
36.
data mining
37.
data mining and knowledge discovery
38.
data security
39.
data stream mining
40.
data-mining
41.
deep-sea mining
42.
development of security cameras
43.
digital security practices
44.
distributed data mining
45.
distributed data mining (DDM)
46.
drinking water security
47.
economic security
48.
economic security of enterprise
49.
educational data mining
50.
educational data-mining
51.
emotional security
52.
energy security
53.
energy security indicator
54.
Estonian information security standard
55.
European mining
56.
graded security
57.
hardware security
58.
hardware security primitive
59.
high level of security
60.
Homeland security
61.
human security
62.
informal mining
63.
information security
64.
information security and privacy
65.
initial level of security
66.
internal security
67.
international security
68.
investment and innovation security
69.
IPv6 security
70.
IT security
71.
IT security management
72.
job security
73.
knowledge discovery and data mining
74.
long-term security
75.
maritime cyber security
76.
maritime cyber security operations centers
77.
Maritime Security Operations Center (M-SOC)
78.
medium level of security
79.
metadata model for security measures
80.
metal mining
81.
Middle Eastern security
82.
mining
83.
mining block
84.
mining co- and by-products
85.
mining industry
86.
Mining life cycle
87.
mining line patterns from event logs
88.
mining losses
89.
mining organization
90.
mining patterns from event logs
91.
mining regulations
92.
mining technology
93.
mining waste
94.
mining waste management
95.
Mobile security
96.
national cyber security strategy
97.
national security
98.
NATO. Science for Peace and Security Program
99.
network security
100.
network security monitoring
101.
numerical association rule mining
102.
oil shale mining
103.
OSCE (Organization for Security and Co-operation in Europe)
104.
passenger’s security
105.
pattern mining for event logs
106.
pattern mining from event logs
107.
pattern mining from log files
108.
policy-based routing security
109.
political and security cultures
110.
post-mining land use
111.
post-quantum security
112.
power system security
113.
quantitative association rule mining
114.
quantitative security
115.
regional security
116.
RISC-V Security Verification
117.
room-and-pillar mining
118.
Safety and Security in Sea Transportation
119.
safety and security testing
120.
security
121.
security adaptation
122.
security alert prioritization
123.
security analysis
124.
security and justice (AFSJ)
125.
Security and political science
126.
security and privacy
127.
security and privacy in smart grids
128.
security closure
129.
Security Coverage
130.
security dataset
131.
security dilemma
132.
Security evaluation
133.
security evaluation instruments
134.
Security Level Evaluation
135.
Security limitations
136.
security log analysis
137.
security management
138.
security model
139.
security monitoring
140.
security notion
141.
security objectives
142.
security of data
143.
security of supply
144.
security operation center
145.
security operations center
146.
security patterns
147.
security policy
148.
security problem definition
149.
security proof
150.
security protocols
151.
security requirements
152.
security requirements engineering
153.
security research
154.
security risk assessment
155.
security risk management
156.
security risks
157.
security science and technology
158.
security strategies
159.
security systems for military objects
160.
security testing
161.
security training
162.
security verification
163.
security-by-design
164.
selective mining
165.
social security planning
166.
societal security
167.
software security
168.
software security level
169.
software security subcharacteristics
170.
space mining
171.
sufficient level of security
172.
sustainable mining
173.
system of economic security
174.
system security
175.
terrorism security
176.
text mining
177.
transmission System Security
178.
underground mining
179.
web usage mining
180.
voting privacy and security
181.
vulnerability mining
182.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT