Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Security Assertion Mining (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/184)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
artikkel ajakirjas
Seotud publikatsioonid
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
artikkel kogumikus
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
182
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
Security Assertion
6.
assertion
7.
assertion candidate
8.
assertion checkers
9.
Assertion Minimization
10.
assertion qualification
11.
assertion sign
12.
assertion-based verification
13.
Husserl on inclusion and assertion
14.
Peirce on inclusion and assertion
15.
sheet of assertion
16.
ad-hoc sensor networks security
17.
association rule mining
18.
Australian mining industry
19.
Automatic Security Verification
20.
Blockchain security
21.
business process mining
22.
cache security
23.
cloud security
24.
communication system security
25.
comprehensive system of economic security
26.
computer security
27.
cooperative security dilemma
28.
cyber security
29.
cyber security education
30.
cyber security exercises
31.
cyber security monitoring
32.
cyber security strategies
33.
cyber-physical system security
34.
cyber-security
35.
data and information security
36.
data mining
37.
data mining and knowledge discovery
38.
data security
39.
data stream mining
40.
data-mining
41.
deep-sea mining
42.
development of security cameras
43.
digital security practices
44.
distributed data mining
45.
distributed data mining (DDM)
46.
drinking water security
47.
economic security
48.
economic security of enterprise
49.
educational data mining
50.
educational data-mining
51.
emotional security
52.
energy security
53.
energy security indicator
54.
Estonian information security standard
55.
European mining
56.
graded security
57.
hardware security
58.
hardware security primitive
59.
high level of security
60.
Homeland security
61.
human security
62.
informal mining
63.
information security
64.
information security and privacy
65.
initial level of security
66.
internal security
67.
international security
68.
investment and innovation security
69.
IPv6 security
70.
IT security
71.
IT security management
72.
job security
73.
knowledge discovery and data mining
74.
long-term security
75.
maritime cyber security
76.
maritime cyber security operations centers
77.
Maritime Security Operations Center (M-SOC)
78.
medium level of security
79.
metadata model for security measures
80.
metal mining
81.
Middle Eastern security
82.
mining
83.
mining block
84.
mining co- and by-products
85.
mining industry
86.
Mining life cycle
87.
mining line patterns from event logs
88.
mining losses
89.
mining organization
90.
mining patterns from event logs
91.
mining regulations
92.
mining technology
93.
mining waste
94.
mining waste management
95.
Mobile security
96.
national cyber security strategy
97.
national security
98.
NATO. Science for Peace and Security Program
99.
network security
100.
network security monitoring
101.
numerical association rule mining
102.
oil shale mining
103.
OSCE (Organization for Security and Co-operation in Europe)
104.
passenger’s security
105.
pattern mining for event logs
106.
pattern mining from event logs
107.
pattern mining from log files
108.
policy-based routing security
109.
political and security cultures
110.
post-mining land use
111.
post-quantum security
112.
power system security
113.
quantitative association rule mining
114.
quantitative security
115.
regional security
116.
RISC-V Security Verification
117.
room-and-pillar mining
118.
Safety and Security in Sea Transportation
119.
safety and security testing
120.
security
121.
security adaptation
122.
security alert prioritization
123.
security analysis
124.
security and justice (AFSJ)
125.
Security and political science
126.
security and privacy
127.
security and privacy in smart grids
128.
security closure
129.
Security Coverage
130.
security dataset
131.
security dilemma
132.
Security evaluation
133.
security evaluation instruments
134.
Security Level Evaluation
135.
Security limitations
136.
security log analysis
137.
security management
138.
security model
139.
security monitoring
140.
security notion
141.
security objectives
142.
security of data
143.
security of supply
144.
security operation center
145.
security operations center
146.
security patterns
147.
security policy
148.
security problem definition
149.
security proof
150.
security protocols
151.
security requirements
152.
security requirements engineering
153.
security research
154.
security risk assessment
155.
security risk management
156.
security risks
157.
security science and technology
158.
security strategies
159.
security systems for military objects
160.
security testing
161.
security training
162.
security verification
163.
security-by-design
164.
selective mining
165.
social security planning
166.
societal security
167.
software security
168.
software security level
169.
software security subcharacteristics
170.
space mining
171.
sufficient level of security
172.
sustainable mining
173.
system of economic security
174.
system security
175.
terrorism security
176.
text mining
177.
transmission System Security
178.
underground mining
179.
web usage mining
180.
voting privacy and security
181.
vulnerability mining
182.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT