Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security verification (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/123)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Towards multidimensional verification : where functional meets non-functional
Jenihhin, Maksim
;
Lai, Xinhui
;
Ghasempouri, Tara
;
Raik, Jaan
2018 IEEE Nordic Circuits and Systems Conference (NORCAS) : NORCHIP and International Symposium of System-on-Chip (SoC) : 30-31 October 2018, Tallinn, Estonia : proceedings in IEEE Xplore
2018
/
7 p. : ill
https://doi.org/10.1109/NORCHIP.2018.8573495
book article
Seotud publikatsioonid
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
2
journal article EST
/
journal article ENG
Understanding multidimensional verification : where functional meets non-functional
Lai, Xinhui
;
Balakrishnan, Aneesh
;
Lange, Thomas
;
Jenihhin, Maksim
;
Ghasempouri, Tara
;
Raik, Jaan
;
Alexandrescu, Dan
Microprocessors and microsystems
2019
/
art. 102867, 13 p. : ill
https://doi.org/10.1016/j.micpro.2019.102867
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
2
A synthetic, hierarchical approach for modelling and managing complex systems' quality and reliability = Sünteetiline, hierarhiline lähenemine keerukate süsteemide kvaliteedi ja töökindluse modelleerimiseks ja haldamiseks
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
3
journal article EST
/
journal article ENG
Verifying cache architecture vulnerabilities using a formal security verification flow
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, Mottaqiallah
Microelectronics reliability
2021
/
art. 114085
https://doi.org/10.1016/j.microrel.2021.114085
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
121
1.
Automatic Security Verification
2.
RISC-V Security Verification
3.
security verification
4.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
5.
assertion-based verification
6.
Automata, Formal Verification
7.
automatic speaker verification
8.
compliance verification
9.
compositional verification
10.
deductive verification
11.
extra-functional verification
12.
forecast verification
13.
formal verification
14.
functional verification
15.
grid verification
16.
Hardware Verification
17.
model verification
18.
model-based verification
19.
power verification
20.
program verification
21.
reliability verification
22.
simple payment verification (SVP)
23.
simulation-based verification
24.
speaker verification
25.
timing verification
26.
validation and verification
27.
verification
28.
verification and validation
29.
verification by model checking
30.
verification methods
31.
ad-hoc sensor networks security
32.
Blockchain security
33.
cache security
34.
communication system security
35.
comprehensive system of economic security
36.
computer security
37.
cooperative security dilemma
38.
cyber security
39.
cyber security education
40.
cyber security exercises
41.
cyber security strategies
42.
cyber-security
43.
data security
44.
development of security cameras
45.
drinking water security
46.
economic security
47.
economic security of enterprise
48.
emotional security
49.
energy security
50.
energy security indicator
51.
Estonian information security standard
52.
graded security
53.
hardware security
54.
hardware security primitive
55.
human security
56.
information security
57.
internal security
58.
international security
59.
investment and innovation security
60.
IPv6 security
61.
IT security
62.
IT security management
63.
job security
64.
long-term security
65.
metadata model for security measures
66.
Middle Eastern security
67.
Mobile security
68.
national cyber security strategy
69.
national security
70.
NATO. Science for Peace and Security Program
71.
network security
72.
network security monitoring
73.
OSCE (Organization for Security and Co-operation in Europe)
74.
passenger’s security
75.
policy-based routing security
76.
political and security cultures
77.
post-quantum security
78.
power system security
79.
quantitative security
80.
regional security
81.
security
82.
security adaptation
83.
security and justice (AFSJ)
84.
security and privacy
85.
security and privacy in smart grids
86.
Security Assertion Mining
87.
security closure
88.
Security Coverage
89.
security dataset
90.
security dilemma
91.
Security evaluation
92.
security evaluation instruments
93.
security log analysis
94.
security management
95.
security model
96.
security monitoring
97.
security notion
98.
security objectives
99.
security of data
100.
security of supply
101.
security operation center
102.
security patterns
103.
security policy
104.
security problem definition
105.
security proof
106.
security protocols
107.
security requirements
108.
security requirements engineering
109.
security risk assessment
110.
security risk management
111.
security strategies
112.
security systems for military objects
113.
security testing
114.
security training
115.
social security planning
116.
societal security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT