Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security Coverage (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/104)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Reusing verification assertions as security checkers for Hardware Trojan detection
Eslami, Mohammad
;
Ghasempouri, Tara
;
Pagliarini, Samuel Nascimento
2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA : 06-07 April 2022
2022
/
p. 1-6 : ill
https://doi.org/10.1109/ISQED54688.2022.9806292
book article
Number of records 1, displaying
1 - 1
keyword
102
1.
Security Coverage
2.
code coverage
3.
code-coverage
4.
conceptual coverage
5.
coverage
6.
coverage factor
7.
diagnostic coverage
8.
fault coverage
9.
gaps in coverage
10.
high-level fault coverage
11.
insurance coverage
12.
NB-IoT coverage
13.
stress coverage
14.
test coverage
15.
5G coverage
16.
ad-hoc sensor networks security
17.
Automatic Security Verification
18.
Blockchain security
19.
cache security
20.
communication system security
21.
comprehensive system of economic security
22.
computer security
23.
cooperative security dilemma
24.
cyber security
25.
cyber security education
26.
cyber security exercises
27.
cyber security strategies
28.
cyber-security
29.
data security
30.
development of security cameras
31.
drinking water security
32.
economic security
33.
economic security of enterprise
34.
emotional security
35.
energy security
36.
energy security indicator
37.
graded security
38.
hardware security
39.
hardware security primitive
40.
human security
41.
information security
42.
internal security
43.
international security
44.
investment and innovation security
45.
IPv6 security
46.
IT security
47.
job security
48.
long-term security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
security
67.
security and privacy
68.
security and privacy in smart grids
69.
Security Assertion Mining
70.
security closure
71.
security dataset
72.
security dilemma
73.
Security evaluation
74.
security log analysis
75.
security management
76.
security model
77.
security monitoring
78.
security notion
79.
security objectives
80.
security of data
81.
security of supply
82.
security operation center
83.
security patterns
84.
security problem definition
85.
security proof
86.
security protocols
87.
security requirements
88.
security requirements engineering
89.
security risk assessment
90.
security risk management
91.
security strategies
92.
security systems for military objects
93.
security testing
94.
security training
95.
security verification
96.
social security planning
97.
societal security
98.
system of economic security
99.
system security
100.
terrorism security
101.
transmission System Security
102.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT