Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Security Assertion Mining (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/168)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
artikkel ajakirjas
Seotud publikatsioonid
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
artikkel kogumikus
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
166
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
assertion
6.
assertion candidate
7.
assertion checkers
8.
Assertion Minimization
9.
assertion qualification
10.
assertion sign
11.
assertion-based verification
12.
Husserl on inclusion and assertion
13.
Peirce on inclusion and assertion
14.
sheet of assertion
15.
ad-hoc sensor networks security
16.
association rule mining
17.
Australian mining industry
18.
Automatic Security Verification
19.
Blockchain security
20.
business process mining
21.
cache security
22.
communication system security
23.
comprehensive system of economic security
24.
computer security
25.
cooperative security dilemma
26.
cyber security
27.
cyber security education
28.
cyber security exercises
29.
cyber security monitoring
30.
cyber security strategies
31.
cyber-security
32.
data and information security
33.
data mining
34.
data mining and knowledge discovery
35.
data security
36.
data stream mining
37.
data-mining
38.
deep-sea mining
39.
development of security cameras
40.
digital security practices
41.
distributed data mining
42.
distributed data mining (DDM)
43.
drinking water security
44.
economic security
45.
economic security of enterprise
46.
educational data mining
47.
educational data-mining
48.
emotional security
49.
energy security
50.
energy security indicator
51.
Estonian information security standard
52.
European mining
53.
graded security
54.
hardware security
55.
hardware security primitive
56.
human security
57.
informal mining
58.
information security
59.
information security and privacy
60.
internal security
61.
international security
62.
investment and innovation security
63.
IPv6 security
64.
IT security
65.
IT security management
66.
job security
67.
knowledge discovery and data mining
68.
long-term security
69.
metadata model for security measures
70.
metal mining
71.
Middle Eastern security
72.
mining
73.
mining block
74.
mining co- and by-products
75.
mining industry
76.
Mining life cycle
77.
mining line patterns from event logs
78.
mining losses
79.
mining organization
80.
mining patterns from event logs
81.
mining regulations
82.
mining technology
83.
mining waste
84.
mining waste management
85.
Mobile security
86.
national cyber security strategy
87.
national security
88.
NATO. Science for Peace and Security Program
89.
network security
90.
network security monitoring
91.
numerical association rule mining
92.
oil shale mining
93.
OSCE (Organization for Security and Co-operation in Europe)
94.
passenger’s security
95.
pattern mining for event logs
96.
pattern mining from event logs
97.
pattern mining from log files
98.
policy-based routing security
99.
political and security cultures
100.
post-mining land use
101.
post-quantum security
102.
power system security
103.
quantitative association rule mining
104.
quantitative security
105.
regional security
106.
RISC-V Security Verification
107.
room-and-pillar mining
108.
Safety and Security in Sea Transportation
109.
safety and security testing
110.
security
111.
security adaptation
112.
security alert prioritization
113.
security analysis
114.
security and justice (AFSJ)
115.
Security and political science
116.
security and privacy
117.
security and privacy in smart grids
118.
security closure
119.
Security Coverage
120.
security dataset
121.
security dilemma
122.
Security evaluation
123.
security evaluation instruments
124.
Security limitations
125.
security log analysis
126.
security management
127.
security model
128.
security monitoring
129.
security notion
130.
security objectives
131.
security of data
132.
security of supply
133.
security operation center
134.
security operations center
135.
security patterns
136.
security policy
137.
security problem definition
138.
security proof
139.
security protocols
140.
security requirements
141.
security requirements engineering
142.
security risk assessment
143.
security risk management
144.
security risks
145.
security science and technology
146.
security strategies
147.
security systems for military objects
148.
security testing
149.
security training
150.
security verification
151.
security-by-design
152.
selective mining
153.
social security planning
154.
societal security
155.
space mining
156.
sustainable mining
157.
system of economic security
158.
system security
159.
terrorism security
160.
text mining
161.
transmission System Security
162.
underground mining
163.
web usage mining
164.
voting privacy and security
165.
vulnerability mining
166.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT