Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Automatic Security Verification (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/189)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
artikkel ajakirjas
Seotud publikatsioonid
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
artikkel kogumikus
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
187
1.
Automatic Security Verification
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
automatic speaker verification
4.
RISC-V Security Verification
5.
security verification
6.
assertion-based verification
7.
Automata, Formal Verification
8.
compliance verification
9.
compositional verification
10.
constraint random verification
11.
deductive verification
12.
extra-functional verification
13.
forecast verification
14.
formal verification
15.
functional verification
16.
grid verification
17.
Hardware Verification
18.
independent verification and validation
19.
model verification
20.
model-based verification
21.
power verification
22.
program verification
23.
Quantum state verification
24.
reliability verification
25.
safety verification
26.
simple payment verification (SVP)
27.
simulation-based verification
28.
speaker verification
29.
timing verification
30.
validation and verification
31.
verification
32.
verification and validation
33.
verification by model checking
34.
verification methods
35.
automatic AI (autoAI)
36.
automatic assertion mining
37.
automatic calibration
38.
automatic clutch engagement
39.
automatic code generation
40.
automatic composition method
41.
automatic control
42.
automatic control systems
43.
automatic controllers
44.
automatic error correction
45.
automatic evaluation
46.
automatic fault diagnosis
47.
automatic frequency control
48.
Automatic generation control
49.
automatic GUI model generation
50.
Automatic identification system
51.
automatic identification system (AIS)
52.
automatic machine learning (autoML)
53.
automatic model creation
54.
automatic processing of solutions
55.
automatic program synthesis
56.
automatic programming
57.
automatic speech recognition
58.
automatic test case generation
59.
automatic test pattern generation
60.
automatic test program generation
61.
automatic tide gauges
62.
automatic weather stations
63.
automatic voltage control
64.
DLL for automatic calibration
65.
Speaker-attributed automatic speech
66.
ad-hoc sensor networks security
67.
Blockchain security
68.
cache security
69.
cloud security
70.
communication system security
71.
comprehensive system of economic security
72.
computer security
73.
cooperative security dilemma
74.
cyber security
75.
cyber security education
76.
cyber security exercises
77.
cyber security monitoring
78.
cyber security monitoring in maritime
79.
cyber security strategies
80.
cyber-physical system security
81.
cyber-security
82.
data and information security
83.
data security
84.
development of security cameras
85.
digital security practices
86.
drinking water security
87.
economic security
88.
economic security of enterprise
89.
emotional security
90.
energy security
91.
energy security indicator
92.
Estonian information security standard
93.
graded security
94.
hardware security
95.
hardware security primitive
96.
high level of security
97.
Homeland security
98.
human security
99.
information security
100.
information security and privacy
101.
initial level of security
102.
internal security
103.
international security
104.
investment and innovation security
105.
IPv6 security
106.
IT security
107.
IT security management
108.
job security
109.
long-term security
110.
maritime cyber security
111.
maritime cyber security operations centers
112.
Maritime Security Operations Center (M-SOC)
113.
medium level of security
114.
metadata model for security measures
115.
Middle Eastern security
116.
Mobile security
117.
national cyber security strategy
118.
national security
119.
NATO. Science for Peace and Security Program
120.
network security
121.
network security monitoring
122.
OSCE (Organization for Security and Co-operation in Europe)
123.
passenger’s security
124.
policy-based routing security
125.
political and security cultures
126.
post-quantum security
127.
power system security
128.
quantitative security
129.
regional security
130.
Safety and Security in Sea Transportation
131.
safety and security testing
132.
security
133.
security adaptation
134.
security alert prioritization
135.
security analysis
136.
security and justice (AFSJ)
137.
Security and political science
138.
security and privacy
139.
security and privacy in smart grids
140.
Security Assertion
141.
Security Assertion Mining
142.
security closure
143.
Security Coverage
144.
security dataset
145.
security dilemma
146.
Security evaluation
147.
security evaluation instruments
148.
Security Level Evaluation
149.
Security limitations
150.
security log analysis
151.
security management
152.
security model
153.
security monitoring
154.
security notion
155.
security objectives
156.
security of data
157.
security of supply
158.
security operation center
159.
security operations center
160.
security patterns
161.
security policy
162.
security problem definition
163.
security proof
164.
security protocols
165.
security requirements
166.
security requirements engineering
167.
security research
168.
security risk assessment
169.
security risk management
170.
security risks
171.
security science and technology
172.
security strategies
173.
security systems for military objects
174.
security testing
175.
security training
176.
security-by-design
177.
social security planning
178.
societal security
179.
software security
180.
software security level
181.
software security subcharacteristics
182.
sufficient level of security
183.
system of economic security
184.
system security
185.
terrorism security
186.
transmission System Security
187.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT