Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security closure (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/96)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Benchmarking advanced security closure of physical layouts
Eslami, Mohammad
;
Knechtel, Johann
;
Sinanoglu, Ozgur
;
Karri, Ramesh
;
Pagliarini, Samuel Nascimento
ISPD '23 : proceedings of the 2023 International Symposium on Physical Design
2023
/
p. 256-264
https://doi.org/10.1145/3569052.3578924
https://dl.acm.org/doi/pdf/10.1145/3569052.3578924
book article
Number of records 1, displaying
1 - 1
keyword
94
1.
security closure
2.
closure depth
3.
closure equations
4.
loop-closure detection
5.
mine closure
6.
routing closure
7.
trace closure
8.
ad-hoc sensor networks security
9.
Automatic Security Verification
10.
Blockchain security
11.
cache security
12.
communication system security
13.
comprehensive system of economic security
14.
computer security
15.
cooperative security dilemma
16.
cyber security
17.
cyber security education
18.
cyber security exercises
19.
cyber security strategies
20.
cyber-security
21.
data security
22.
development of security cameras
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
human security
33.
information security
34.
internal security
35.
international security
36.
investment and innovation security
37.
IPv6 security
38.
IT security
39.
job security
40.
long-term security
41.
metadata model for security measures
42.
Middle Eastern security
43.
Mobile security
44.
national cyber security strategy
45.
national security
46.
NATO. Science for Peace and Security Program
47.
network security
48.
network security monitoring
49.
OSCE (Organization for Security and Co-operation in Europe)
50.
passenger’s security
51.
policy-based routing security
52.
political and security cultures
53.
post-quantum security
54.
power system security
55.
quantitative security
56.
regional security
57.
RISC-V Security Verification
58.
security
59.
security and privacy
60.
security and privacy in smart grids
61.
Security Assertion Mining
62.
Security Coverage
63.
security dataset
64.
security dilemma
65.
Security evaluation
66.
security log analysis
67.
security management
68.
security model
69.
security monitoring
70.
security notion
71.
security objectives
72.
security of data
73.
security of supply
74.
security operation center
75.
security patterns
76.
security problem definition
77.
security proof
78.
security protocols
79.
security requirements
80.
security requirements engineering
81.
security risk assessment
82.
security risk management
83.
security strategies
84.
security systems for military objects
85.
security testing
86.
security training
87.
security verification
88.
social security planning
89.
societal security
90.
system of economic security
91.
system security
92.
terrorism security
93.
transmission System Security
94.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT