Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security verification (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/113)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Towards multidimensional verification : where functional meets non-functional
Jenihhin, Maksim
;
Lai, Xinhui
;
Ghasempouri, Tara
;
Raik, Jaan
2018 IEEE Nordic Circuits and Systems Conference (NORCAS) : NORCHIP and International Symposium of System-on-Chip (SoC) : 30-31 October 2018, Tallinn, Estonia : proceedings in IEEE Xplore
2018
/
7 p. : ill
https://doi.org/10.1109/NORCHIP.2018.8573495
book article
Seotud publikatsioonid
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
2
journal article EST
/
journal article ENG
Understanding multidimensional verification : where functional meets non-functional
Lai, Xinhui
;
Balakrishnan, Aneesh
;
Lange, Thomas
;
Jenihhin, Maksim
;
Ghasempouri, Tara
;
Raik, Jaan
;
Alexandrescu, Dan
Microprocessors and microsystems
2019
/
art. 102867, 13 p. : ill
https://doi.org/10.1016/j.micpro.2019.102867
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
2
A synthetic, hierarchical approach for modelling and managing complex systems' quality and reliability = Sünteetiline, hierarhiline lähenemine keerukate süsteemide kvaliteedi ja töökindluse modelleerimiseks ja haldamiseks
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
3
journal article EST
/
journal article ENG
Verifying cache architecture vulnerabilities using a formal security verification flow
Ghasempouri, Tara
;
Raik, Jaan
;
Paul, Kolin
;
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, Mottaqiallah
Microelectronics reliability
2021
/
art. 114085
https://doi.org/10.1016/j.microrel.2021.114085
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
111
1.
security verification
2.
assertion-based verification
3.
Automata, Formal Verification
4.
automatic speaker verification
5.
compliance verification
6.
compositional verification
7.
deductive verification
8.
extra-functional verification
9.
forecast verification
10.
formal verification
11.
functional verification
12.
grid verification
13.
Hardware Verification
14.
model verification
15.
model-based verification
16.
power verification
17.
program verification
18.
reliability verification
19.
simple payment verification (SVP)
20.
simulation-based verification
21.
speaker verification
22.
timing verification
23.
validation and verification
24.
verification
25.
verification and validation
26.
verification by model checking
27.
verification methods
28.
ad-hoc sensor networks security
29.
Blockchain security
30.
cache security
31.
communication system security
32.
comprehensive system of economic security
33.
computer security
34.
cooperative security dilemma
35.
cyber security
36.
cyber security education
37.
cyber security exercises
38.
cyber security strategies
39.
cyber-security
40.
data security
41.
development of security cameras
42.
drinking water security
43.
economic security
44.
economic security of enterprise
45.
emotional security
46.
energy security
47.
energy security indicator
48.
graded security
49.
hardware security
50.
hardware security primitive
51.
human security
52.
information security
53.
internal security
54.
international security
55.
investment and innovation security
56.
IPv6 security
57.
IT security
58.
job security
59.
long-term security
60.
metadata model for security measures
61.
Middle Eastern security
62.
Mobile security
63.
national cyber security strategy
64.
national security
65.
NATO. Science for Peace and Security Program
66.
network security
67.
network security monitoring
68.
OSCE (Organization for Security and Co-operation in Europe)
69.
passenger’s security
70.
policy-based routing security
71.
political and security cultures
72.
post-quantum security
73.
power system security
74.
quantitative security
75.
regional security
76.
security
77.
security and privacy
78.
security and privacy in smart grids
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security patterns
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security risk assessment
100.
security risk management
101.
security strategies
102.
security systems for military objects
103.
security testing
104.
security training
105.
social security planning
106.
societal security
107.
system of economic security
108.
system security
109.
terrorism security
110.
transmission System Security
111.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT