Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Assertion Mining (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/180)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
178
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
assertion
6.
assertion candidate
7.
assertion checkers
8.
Assertion Minimization
9.
assertion qualification
10.
assertion sign
11.
assertion-based verification
12.
Husserl on inclusion and assertion
13.
Peirce on inclusion and assertion
14.
sheet of assertion
15.
ad-hoc sensor networks security
16.
association rule mining
17.
Australian mining industry
18.
Automatic Security Verification
19.
Blockchain security
20.
business process mining
21.
cache security
22.
communication system security
23.
comprehensive system of economic security
24.
computer security
25.
cooperative security dilemma
26.
cyber security
27.
cyber security education
28.
cyber security exercises
29.
cyber security monitoring
30.
cyber security strategies
31.
cyber-security
32.
data and information security
33.
data mining
34.
data mining and knowledge discovery
35.
data security
36.
data stream mining
37.
data-mining
38.
deep-sea mining
39.
development of security cameras
40.
digital security practices
41.
distributed data mining
42.
distributed data mining (DDM)
43.
drinking water security
44.
economic security
45.
economic security of enterprise
46.
educational data mining
47.
educational data-mining
48.
emotional security
49.
energy security
50.
energy security indicator
51.
Estonian information security standard
52.
European mining
53.
graded security
54.
hardware security
55.
hardware security primitive
56.
high level of security
57.
Homeland security
58.
human security
59.
informal mining
60.
information security
61.
information security and privacy
62.
initial level of security
63.
internal security
64.
international security
65.
investment and innovation security
66.
IPv6 security
67.
IT security
68.
IT security management
69.
job security
70.
knowledge discovery and data mining
71.
long-term security
72.
maritime cyber security
73.
maritime cyber security operations centers
74.
Maritime Security Operations Center (M-SOC)
75.
medium level of security
76.
metadata model for security measures
77.
metal mining
78.
Middle Eastern security
79.
mining
80.
mining block
81.
mining co- and by-products
82.
mining industry
83.
Mining life cycle
84.
mining line patterns from event logs
85.
mining losses
86.
mining organization
87.
mining patterns from event logs
88.
mining regulations
89.
mining technology
90.
mining waste
91.
mining waste management
92.
Mobile security
93.
national cyber security strategy
94.
national security
95.
NATO. Science for Peace and Security Program
96.
network security
97.
network security monitoring
98.
numerical association rule mining
99.
oil shale mining
100.
OSCE (Organization for Security and Co-operation in Europe)
101.
passenger’s security
102.
pattern mining for event logs
103.
pattern mining from event logs
104.
pattern mining from log files
105.
policy-based routing security
106.
political and security cultures
107.
post-mining land use
108.
post-quantum security
109.
power system security
110.
quantitative association rule mining
111.
quantitative security
112.
regional security
113.
RISC-V Security Verification
114.
room-and-pillar mining
115.
Safety and Security in Sea Transportation
116.
safety and security testing
117.
security
118.
security adaptation
119.
security alert prioritization
120.
security analysis
121.
security and justice (AFSJ)
122.
Security and political science
123.
security and privacy
124.
security and privacy in smart grids
125.
security closure
126.
Security Coverage
127.
security dataset
128.
security dilemma
129.
Security evaluation
130.
security evaluation instruments
131.
Security limitations
132.
security log analysis
133.
security management
134.
security model
135.
security monitoring
136.
security notion
137.
security objectives
138.
security of data
139.
security of supply
140.
security operation center
141.
security operations center
142.
security patterns
143.
security policy
144.
security problem definition
145.
security proof
146.
security protocols
147.
security requirements
148.
security requirements engineering
149.
security research
150.
security risk assessment
151.
security risk management
152.
security risks
153.
security science and technology
154.
security strategies
155.
security systems for military objects
156.
security testing
157.
security training
158.
security verification
159.
security-by-design
160.
selective mining
161.
social security planning
162.
societal security
163.
software security
164.
software security level
165.
software security subcharacteristics
166.
space mining
167.
sufficient level of security
168.
sustainable mining
169.
system of economic security
170.
system security
171.
terrorism security
172.
text mining
173.
transmission System Security
174.
underground mining
175.
web usage mining
176.
voting privacy and security
177.
vulnerability mining
178.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT