Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Assertion Mining (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/186)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
184
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
Security Assertion
6.
assertion
7.
assertion candidate
8.
assertion checkers
9.
Assertion Minimization
10.
assertion qualification
11.
assertion sign
12.
assertion-based verification
13.
Husserl on inclusion and assertion
14.
Peirce on inclusion and assertion
15.
sheet of assertion
16.
ad-hoc sensor networks security
17.
Association pattern mining
18.
association rule mining
19.
Australian mining industry
20.
Automatic Security Verification
21.
Blockchain security
22.
business process mining
23.
cache security
24.
cloud security
25.
communication system security
26.
comprehensive system of economic security
27.
computer security
28.
cooperative security dilemma
29.
cyber security
30.
cyber security education
31.
cyber security exercises
32.
cyber security monitoring
33.
cyber security monitoring in maritime
34.
cyber security strategies
35.
cyber-physical system security
36.
cyber-security
37.
data and information security
38.
data mining
39.
data mining and knowledge discovery
40.
data security
41.
data stream mining
42.
data-mining
43.
deep-sea mining
44.
development of security cameras
45.
digital security practices
46.
distributed data mining
47.
distributed data mining (DDM)
48.
drinking water security
49.
economic security
50.
economic security of enterprise
51.
educational data mining
52.
educational data-mining
53.
emotional security
54.
energy security
55.
energy security indicator
56.
Estonian information security standard
57.
European mining
58.
graded security
59.
hardware security
60.
hardware security primitive
61.
high level of security
62.
Homeland security
63.
human security
64.
informal mining
65.
information security
66.
information security and privacy
67.
initial level of security
68.
internal security
69.
international security
70.
investment and innovation security
71.
IPv6 security
72.
IT security
73.
IT security management
74.
job security
75.
knowledge discovery and data mining
76.
long-term security
77.
maritime cyber security
78.
maritime cyber security operations centers
79.
Maritime Security Operations Center (M-SOC)
80.
medium level of security
81.
metadata model for security measures
82.
metal mining
83.
Middle Eastern security
84.
mining
85.
mining block
86.
mining co- and by-products
87.
mining industry
88.
Mining life cycle
89.
mining line patterns from event logs
90.
mining losses
91.
mining organization
92.
mining patterns from event logs
93.
mining regulations
94.
mining technology
95.
mining waste
96.
mining waste management
97.
Mobile security
98.
national cyber security strategy
99.
national security
100.
NATO. Science for Peace and Security Program
101.
network security
102.
network security monitoring
103.
numerical association rule mining
104.
oil shale mining
105.
OSCE (Organization for Security and Co-operation in Europe)
106.
passenger’s security
107.
pattern mining for event logs
108.
pattern mining from event logs
109.
pattern mining from log files
110.
policy-based routing security
111.
political and security cultures
112.
post-mining land use
113.
post-quantum security
114.
power system security
115.
quantitative association rule mining
116.
quantitative security
117.
regional security
118.
RISC-V Security Verification
119.
room-and-pillar mining
120.
safety and security in sea transportation
121.
safety and security testing
122.
security
123.
security adaptation
124.
security alert prioritization
125.
security analysis
126.
security and justice (AFSJ)
127.
Security and political science
128.
security and privacy
129.
security and privacy in smart grids
130.
security closure
131.
Security Coverage
132.
security dataset
133.
security dilemma
134.
Security evaluation
135.
security evaluation instruments
136.
Security Level Evaluation
137.
Security limitations
138.
security log analysis
139.
security management
140.
security model
141.
security monitoring
142.
security notion
143.
security objectives
144.
security of data
145.
security of supply
146.
security operation center
147.
security operations center
148.
security patterns
149.
security policy
150.
security problem definition
151.
security proof
152.
security protocols
153.
security requirements
154.
security requirements engineering
155.
security research
156.
security risk assessment
157.
security risk management
158.
security risks
159.
security science and technology
160.
security strategies
161.
security systems for military objects
162.
security testing
163.
security training
164.
security verification
165.
security-by-design
166.
selective mining
167.
social security planning
168.
societal security
169.
software security
170.
software security level
171.
software security subcharacteristics
172.
space mining
173.
sufficient level of security
174.
sustainable mining
175.
system of economic security
176.
system security
177.
terrorism security
178.
text mining
179.
transmission System Security
180.
underground mining
181.
web usage mining
182.
voting privacy and security
183.
vulnerability mining
184.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT