Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Automatic Security Verification (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/182)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
artikkel ajakirjas
Seotud publikatsioonid
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
artikkel kogumikus
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
180
1.
Automatic Security Verification
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
automatic speaker verification
4.
RISC-V Security Verification
5.
security verification
6.
assertion-based verification
7.
Automata, Formal Verification
8.
compliance verification
9.
compositional verification
10.
constraint random verification
11.
deductive verification
12.
extra-functional verification
13.
forecast verification
14.
formal verification
15.
functional verification
16.
grid verification
17.
Hardware Verification
18.
model verification
19.
model-based verification
20.
power verification
21.
program verification
22.
Quantum state verification
23.
reliability verification
24.
simple payment verification (SVP)
25.
simulation-based verification
26.
speaker verification
27.
timing verification
28.
validation and verification
29.
verification
30.
verification and validation
31.
verification by model checking
32.
verification methods
33.
automatic AI (autoAI)
34.
automatic assertion mining
35.
automatic calibration
36.
automatic clutch engagement
37.
automatic code generation
38.
automatic composition method
39.
automatic control
40.
automatic control systems
41.
automatic controllers
42.
automatic error correction
43.
automatic evaluation
44.
automatic fault diagnosis
45.
Automatic generation control
46.
automatic GUI model generation
47.
Automatic identification system
48.
automatic identification system (AIS)
49.
automatic machine learning (autoML)
50.
automatic model creation
51.
automatic processing of solutions
52.
automatic program synthesis
53.
automatic programming
54.
automatic speech recognition
55.
automatic test case generation
56.
automatic test pattern generation
57.
automatic test program generation
58.
automatic tide gauges
59.
automatic weather stations
60.
automatic voltage control
61.
DLL for automatic calibration
62.
Speaker-attributed automatic speech
63.
ad-hoc sensor networks security
64.
Blockchain security
65.
cache security
66.
communication system security
67.
comprehensive system of economic security
68.
computer security
69.
cooperative security dilemma
70.
cyber security
71.
cyber security education
72.
cyber security exercises
73.
cyber security monitoring
74.
cyber security strategies
75.
cyber-security
76.
data and information security
77.
data security
78.
development of security cameras
79.
digital security practices
80.
drinking water security
81.
economic security
82.
economic security of enterprise
83.
emotional security
84.
energy security
85.
energy security indicator
86.
Estonian information security standard
87.
graded security
88.
hardware security
89.
hardware security primitive
90.
high level of security
91.
Homeland security
92.
human security
93.
information security
94.
information security and privacy
95.
initial level of security
96.
internal security
97.
international security
98.
investment and innovation security
99.
IPv6 security
100.
IT security
101.
IT security management
102.
job security
103.
long-term security
104.
maritime cyber security
105.
maritime cyber security operations centers
106.
Maritime Security Operations Center (M-SOC)
107.
medium level of security
108.
metadata model for security measures
109.
Middle Eastern security
110.
Mobile security
111.
national cyber security strategy
112.
national security
113.
NATO. Science for Peace and Security Program
114.
network security
115.
network security monitoring
116.
OSCE (Organization for Security and Co-operation in Europe)
117.
passenger’s security
118.
policy-based routing security
119.
political and security cultures
120.
post-quantum security
121.
power system security
122.
quantitative security
123.
regional security
124.
Safety and Security in Sea Transportation
125.
safety and security testing
126.
security
127.
security adaptation
128.
security alert prioritization
129.
security analysis
130.
security and justice (AFSJ)
131.
Security and political science
132.
security and privacy
133.
security and privacy in smart grids
134.
Security Assertion Mining
135.
security closure
136.
Security Coverage
137.
security dataset
138.
security dilemma
139.
Security evaluation
140.
security evaluation instruments
141.
Security Level Evaluation
142.
Security limitations
143.
security log analysis
144.
security management
145.
security model
146.
security monitoring
147.
security notion
148.
security objectives
149.
security of data
150.
security of supply
151.
security operation center
152.
security operations center
153.
security patterns
154.
security policy
155.
security problem definition
156.
security proof
157.
security protocols
158.
security requirements
159.
security requirements engineering
160.
security research
161.
security risk assessment
162.
security risk management
163.
security risks
164.
security science and technology
165.
security strategies
166.
security systems for military objects
167.
security testing
168.
security training
169.
security-by-design
170.
social security planning
171.
societal security
172.
software security
173.
software security level
174.
software security subcharacteristics
175.
sufficient level of security
176.
system of economic security
177.
system security
178.
terrorism security
179.
transmission System Security
180.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT