Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Coverage (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/101)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Reusing verification assertions as security checkers for Hardware Trojan detection
Eslami, Mohammad
;
Ghasempouri, Tara
;
Pagliarini, Samuel Nascimento
2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA : 06-07 April 2022
2022
/
p. 1-6 : ill
https://doi.org/10.1109/ISQED54688.2022.9806292
book article
Number of records 1, displaying
1 - 1
keyword
99
1.
Security Coverage
2.
code coverage
3.
code-coverage
4.
conceptual coverage
5.
coverage
6.
coverage factor
7.
diagnostic coverage
8.
fault coverage
9.
gaps in coverage
10.
high-level fault coverage
11.
insurance coverage
12.
NB-IoT coverage
13.
stress coverage
14.
test coverage
15.
5G coverage
16.
ad-hoc sensor networks security
17.
Blockchain security
18.
cache security
19.
communication system security
20.
comprehensive system of economic security
21.
computer security
22.
cooperative security dilemma
23.
cyber security
24.
cyber security education
25.
cyber security exercises
26.
cyber security strategies
27.
cyber-security
28.
data security
29.
development of security cameras
30.
drinking water security
31.
economic security
32.
economic security of enterprise
33.
emotional security
34.
energy security
35.
energy security indicator
36.
graded security
37.
hardware security
38.
hardware security primitive
39.
human security
40.
information security
41.
internal security
42.
international security
43.
investment and innovation security
44.
IPv6 security
45.
IT security
46.
job security
47.
long-term security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
NATO. Science for Peace and Security Program
54.
network security
55.
network security monitoring
56.
OSCE (Organization for Security and Co-operation in Europe)
57.
passenger’s security
58.
policy-based routing security
59.
political and security cultures
60.
post-quantum security
61.
power system security
62.
quantitative security
63.
regional security
64.
security
65.
security and privacy
66.
security and privacy in smart grids
67.
security closure
68.
security dataset
69.
security dilemma
70.
Security evaluation
71.
security log analysis
72.
security management
73.
security model
74.
security monitoring
75.
security notion
76.
security objectives
77.
security of data
78.
security of supply
79.
security operation center
80.
security patterns
81.
security problem definition
82.
security proof
83.
security protocols
84.
security requirements
85.
security requirements engineering
86.
security risk assessment
87.
security risk management
88.
security strategies
89.
security systems for military objects
90.
security testing
91.
security training
92.
security verification
93.
social security planning
94.
societal security
95.
system of economic security
96.
system security
97.
terrorism security
98.
transmission System Security
99.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT