Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Automatic Security Verification (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/186)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
artikkel ajakirjas
Seotud publikatsioonid
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
artikkel kogumikus
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
184
1.
Automatic Security Verification
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
automatic speaker verification
4.
RISC-V Security Verification
5.
security verification
6.
assertion-based verification
7.
Automata, Formal Verification
8.
compliance verification
9.
compositional verification
10.
constraint random verification
11.
deductive verification
12.
extra-functional verification
13.
forecast verification
14.
formal verification
15.
functional verification
16.
grid verification
17.
Hardware Verification
18.
model verification
19.
model-based verification
20.
power verification
21.
program verification
22.
Quantum state verification
23.
reliability verification
24.
simple payment verification (SVP)
25.
simulation-based verification
26.
speaker verification
27.
timing verification
28.
validation and verification
29.
verification
30.
verification and validation
31.
verification by model checking
32.
verification methods
33.
automatic AI (autoAI)
34.
automatic assertion mining
35.
automatic calibration
36.
automatic clutch engagement
37.
automatic code generation
38.
automatic composition method
39.
automatic control
40.
automatic control systems
41.
automatic controllers
42.
automatic error correction
43.
automatic evaluation
44.
automatic fault diagnosis
45.
Automatic generation control
46.
automatic GUI model generation
47.
Automatic identification system
48.
automatic identification system (AIS)
49.
automatic machine learning (autoML)
50.
automatic model creation
51.
automatic processing of solutions
52.
automatic program synthesis
53.
automatic programming
54.
automatic speech recognition
55.
automatic test case generation
56.
automatic test pattern generation
57.
automatic test program generation
58.
automatic tide gauges
59.
automatic weather stations
60.
automatic voltage control
61.
DLL for automatic calibration
62.
Speaker-attributed automatic speech
63.
ad-hoc sensor networks security
64.
Blockchain security
65.
cache security
66.
cloud security
67.
communication system security
68.
comprehensive system of economic security
69.
computer security
70.
cooperative security dilemma
71.
cyber security
72.
cyber security education
73.
cyber security exercises
74.
cyber security monitoring
75.
cyber security monitoring in maritime
76.
cyber security strategies
77.
cyber-physical system security
78.
cyber-security
79.
data and information security
80.
data security
81.
development of security cameras
82.
digital security practices
83.
drinking water security
84.
economic security
85.
economic security of enterprise
86.
emotional security
87.
energy security
88.
energy security indicator
89.
Estonian information security standard
90.
graded security
91.
hardware security
92.
hardware security primitive
93.
high level of security
94.
Homeland security
95.
human security
96.
information security
97.
information security and privacy
98.
initial level of security
99.
internal security
100.
international security
101.
investment and innovation security
102.
IPv6 security
103.
IT security
104.
IT security management
105.
job security
106.
long-term security
107.
maritime cyber security
108.
maritime cyber security operations centers
109.
Maritime Security Operations Center (M-SOC)
110.
medium level of security
111.
metadata model for security measures
112.
Middle Eastern security
113.
Mobile security
114.
national cyber security strategy
115.
national security
116.
NATO. Science for Peace and Security Program
117.
network security
118.
network security monitoring
119.
OSCE (Organization for Security and Co-operation in Europe)
120.
passenger’s security
121.
policy-based routing security
122.
political and security cultures
123.
post-quantum security
124.
power system security
125.
quantitative security
126.
regional security
127.
Safety and Security in Sea Transportation
128.
safety and security testing
129.
security
130.
security adaptation
131.
security alert prioritization
132.
security analysis
133.
security and justice (AFSJ)
134.
Security and political science
135.
security and privacy
136.
security and privacy in smart grids
137.
Security Assertion
138.
Security Assertion Mining
139.
security closure
140.
Security Coverage
141.
security dataset
142.
security dilemma
143.
Security evaluation
144.
security evaluation instruments
145.
Security Level Evaluation
146.
Security limitations
147.
security log analysis
148.
security management
149.
security model
150.
security monitoring
151.
security notion
152.
security objectives
153.
security of data
154.
security of supply
155.
security operation center
156.
security operations center
157.
security patterns
158.
security policy
159.
security problem definition
160.
security proof
161.
security protocols
162.
security requirements
163.
security requirements engineering
164.
security research
165.
security risk assessment
166.
security risk management
167.
security risks
168.
security science and technology
169.
security strategies
170.
security systems for military objects
171.
security testing
172.
security training
173.
security-by-design
174.
social security planning
175.
societal security
176.
software security
177.
software security level
178.
software security subcharacteristics
179.
sufficient level of security
180.
system of economic security
181.
system security
182.
terrorism security
183.
transmission System Security
184.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT