Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Assertion Mining (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/183)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
181
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
Security Assertion
6.
assertion
7.
assertion candidate
8.
assertion checkers
9.
Assertion Minimization
10.
assertion qualification
11.
assertion sign
12.
assertion-based verification
13.
Husserl on inclusion and assertion
14.
Peirce on inclusion and assertion
15.
sheet of assertion
16.
ad-hoc sensor networks security
17.
association rule mining
18.
Australian mining industry
19.
Automatic Security Verification
20.
Blockchain security
21.
business process mining
22.
cache security
23.
cloud security
24.
communication system security
25.
comprehensive system of economic security
26.
computer security
27.
cooperative security dilemma
28.
cyber security
29.
cyber security education
30.
cyber security exercises
31.
cyber security monitoring
32.
cyber security strategies
33.
cyber-security
34.
data and information security
35.
data mining
36.
data mining and knowledge discovery
37.
data security
38.
data stream mining
39.
data-mining
40.
deep-sea mining
41.
development of security cameras
42.
digital security practices
43.
distributed data mining
44.
distributed data mining (DDM)
45.
drinking water security
46.
economic security
47.
economic security of enterprise
48.
educational data mining
49.
educational data-mining
50.
emotional security
51.
energy security
52.
energy security indicator
53.
Estonian information security standard
54.
European mining
55.
graded security
56.
hardware security
57.
hardware security primitive
58.
high level of security
59.
Homeland security
60.
human security
61.
informal mining
62.
information security
63.
information security and privacy
64.
initial level of security
65.
internal security
66.
international security
67.
investment and innovation security
68.
IPv6 security
69.
IT security
70.
IT security management
71.
job security
72.
knowledge discovery and data mining
73.
long-term security
74.
maritime cyber security
75.
maritime cyber security operations centers
76.
Maritime Security Operations Center (M-SOC)
77.
medium level of security
78.
metadata model for security measures
79.
metal mining
80.
Middle Eastern security
81.
mining
82.
mining block
83.
mining co- and by-products
84.
mining industry
85.
Mining life cycle
86.
mining line patterns from event logs
87.
mining losses
88.
mining organization
89.
mining patterns from event logs
90.
mining regulations
91.
mining technology
92.
mining waste
93.
mining waste management
94.
Mobile security
95.
national cyber security strategy
96.
national security
97.
NATO. Science for Peace and Security Program
98.
network security
99.
network security monitoring
100.
numerical association rule mining
101.
oil shale mining
102.
OSCE (Organization for Security and Co-operation in Europe)
103.
passenger’s security
104.
pattern mining for event logs
105.
pattern mining from event logs
106.
pattern mining from log files
107.
policy-based routing security
108.
political and security cultures
109.
post-mining land use
110.
post-quantum security
111.
power system security
112.
quantitative association rule mining
113.
quantitative security
114.
regional security
115.
RISC-V Security Verification
116.
room-and-pillar mining
117.
Safety and Security in Sea Transportation
118.
safety and security testing
119.
security
120.
security adaptation
121.
security alert prioritization
122.
security analysis
123.
security and justice (AFSJ)
124.
Security and political science
125.
security and privacy
126.
security and privacy in smart grids
127.
security closure
128.
Security Coverage
129.
security dataset
130.
security dilemma
131.
Security evaluation
132.
security evaluation instruments
133.
Security Level Evaluation
134.
Security limitations
135.
security log analysis
136.
security management
137.
security model
138.
security monitoring
139.
security notion
140.
security objectives
141.
security of data
142.
security of supply
143.
security operation center
144.
security operations center
145.
security patterns
146.
security policy
147.
security problem definition
148.
security proof
149.
security protocols
150.
security requirements
151.
security requirements engineering
152.
security research
153.
security risk assessment
154.
security risk management
155.
security risks
156.
security science and technology
157.
security strategies
158.
security systems for military objects
159.
security testing
160.
security training
161.
security verification
162.
security-by-design
163.
selective mining
164.
social security planning
165.
societal security
166.
software security
167.
software security level
168.
software security subcharacteristics
169.
space mining
170.
sufficient level of security
171.
sustainable mining
172.
system of economic security
173.
system security
174.
terrorism security
175.
text mining
176.
transmission System Security
177.
underground mining
178.
web usage mining
179.
voting privacy and security
180.
vulnerability mining
181.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT