Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Security Assertion Mining (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/186)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
artikkel ajakirjas
Seotud publikatsioonid
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
artikkel kogumikus
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
184
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
Security Assertion
6.
assertion
7.
assertion candidate
8.
assertion checkers
9.
Assertion Minimization
10.
assertion qualification
11.
assertion sign
12.
assertion-based verification
13.
Husserl on inclusion and assertion
14.
Peirce on inclusion and assertion
15.
sheet of assertion
16.
ad-hoc sensor networks security
17.
Association pattern mining
18.
association rule mining
19.
Australian mining industry
20.
Automatic Security Verification
21.
Blockchain security
22.
business process mining
23.
cache security
24.
cloud security
25.
communication system security
26.
comprehensive system of economic security
27.
computer security
28.
cooperative security dilemma
29.
cyber security
30.
cyber security education
31.
cyber security exercises
32.
cyber security monitoring
33.
cyber security monitoring in maritime
34.
cyber security strategies
35.
cyber-physical system security
36.
cyber-security
37.
data and information security
38.
data mining
39.
data mining and knowledge discovery
40.
data security
41.
data stream mining
42.
data-mining
43.
deep-sea mining
44.
development of security cameras
45.
digital security practices
46.
distributed data mining
47.
distributed data mining (DDM)
48.
drinking water security
49.
economic security
50.
economic security of enterprise
51.
educational data mining
52.
educational data-mining
53.
emotional security
54.
energy security
55.
energy security indicator
56.
Estonian information security standard
57.
European mining
58.
graded security
59.
hardware security
60.
hardware security primitive
61.
high level of security
62.
Homeland security
63.
human security
64.
informal mining
65.
information security
66.
information security and privacy
67.
initial level of security
68.
internal security
69.
international security
70.
investment and innovation security
71.
IPv6 security
72.
IT security
73.
IT security management
74.
job security
75.
knowledge discovery and data mining
76.
long-term security
77.
maritime cyber security
78.
maritime cyber security operations centers
79.
Maritime Security Operations Center (M-SOC)
80.
medium level of security
81.
metadata model for security measures
82.
metal mining
83.
Middle Eastern security
84.
mining
85.
mining block
86.
mining co- and by-products
87.
mining industry
88.
Mining life cycle
89.
mining line patterns from event logs
90.
mining losses
91.
mining organization
92.
mining patterns from event logs
93.
mining regulations
94.
mining technology
95.
mining waste
96.
mining waste management
97.
Mobile security
98.
national cyber security strategy
99.
national security
100.
NATO. Science for Peace and Security Program
101.
network security
102.
network security monitoring
103.
numerical association rule mining
104.
oil shale mining
105.
OSCE (Organization for Security and Co-operation in Europe)
106.
passenger’s security
107.
pattern mining for event logs
108.
pattern mining from event logs
109.
pattern mining from log files
110.
policy-based routing security
111.
political and security cultures
112.
post-mining land use
113.
post-quantum security
114.
power system security
115.
quantitative association rule mining
116.
quantitative security
117.
regional security
118.
RISC-V Security Verification
119.
room-and-pillar mining
120.
safety and security in sea transportation
121.
safety and security testing
122.
security
123.
security adaptation
124.
security alert prioritization
125.
security analysis
126.
security and justice (AFSJ)
127.
Security and political science
128.
security and privacy
129.
security and privacy in smart grids
130.
security closure
131.
Security Coverage
132.
security dataset
133.
security dilemma
134.
Security evaluation
135.
security evaluation instruments
136.
Security Level Evaluation
137.
Security limitations
138.
security log analysis
139.
security management
140.
security model
141.
security monitoring
142.
security notion
143.
security objectives
144.
security of data
145.
security of supply
146.
security operation center
147.
security operations center
148.
security patterns
149.
security policy
150.
security problem definition
151.
security proof
152.
security protocols
153.
security requirements
154.
security requirements engineering
155.
security research
156.
security risk assessment
157.
security risk management
158.
security risks
159.
security science and technology
160.
security strategies
161.
security systems for military objects
162.
security testing
163.
security training
164.
security verification
165.
security-by-design
166.
selective mining
167.
social security planning
168.
societal security
169.
software security
170.
software security level
171.
software security subcharacteristics
172.
space mining
173.
sufficient level of security
174.
sustainable mining
175.
system of economic security
176.
system security
177.
terrorism security
178.
text mining
179.
transmission System Security
180.
underground mining
181.
web usage mining
182.
voting privacy and security
183.
vulnerability mining
184.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT