Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Security Assertion Mining (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/183)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
artikkel ajakirjas
Seotud publikatsioonid
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
artikkel kogumikus
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
181
1.
Security Assertion Mining
2.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
3.
Assertion Mining
4.
automatic assertion mining
5.
Security Assertion
6.
assertion
7.
assertion candidate
8.
assertion checkers
9.
Assertion Minimization
10.
assertion qualification
11.
assertion sign
12.
assertion-based verification
13.
Husserl on inclusion and assertion
14.
Peirce on inclusion and assertion
15.
sheet of assertion
16.
ad-hoc sensor networks security
17.
association rule mining
18.
Australian mining industry
19.
Automatic Security Verification
20.
Blockchain security
21.
business process mining
22.
cache security
23.
cloud security
24.
communication system security
25.
comprehensive system of economic security
26.
computer security
27.
cooperative security dilemma
28.
cyber security
29.
cyber security education
30.
cyber security exercises
31.
cyber security monitoring
32.
cyber security strategies
33.
cyber-security
34.
data and information security
35.
data mining
36.
data mining and knowledge discovery
37.
data security
38.
data stream mining
39.
data-mining
40.
deep-sea mining
41.
development of security cameras
42.
digital security practices
43.
distributed data mining
44.
distributed data mining (DDM)
45.
drinking water security
46.
economic security
47.
economic security of enterprise
48.
educational data mining
49.
educational data-mining
50.
emotional security
51.
energy security
52.
energy security indicator
53.
Estonian information security standard
54.
European mining
55.
graded security
56.
hardware security
57.
hardware security primitive
58.
high level of security
59.
Homeland security
60.
human security
61.
informal mining
62.
information security
63.
information security and privacy
64.
initial level of security
65.
internal security
66.
international security
67.
investment and innovation security
68.
IPv6 security
69.
IT security
70.
IT security management
71.
job security
72.
knowledge discovery and data mining
73.
long-term security
74.
maritime cyber security
75.
maritime cyber security operations centers
76.
Maritime Security Operations Center (M-SOC)
77.
medium level of security
78.
metadata model for security measures
79.
metal mining
80.
Middle Eastern security
81.
mining
82.
mining block
83.
mining co- and by-products
84.
mining industry
85.
Mining life cycle
86.
mining line patterns from event logs
87.
mining losses
88.
mining organization
89.
mining patterns from event logs
90.
mining regulations
91.
mining technology
92.
mining waste
93.
mining waste management
94.
Mobile security
95.
national cyber security strategy
96.
national security
97.
NATO. Science for Peace and Security Program
98.
network security
99.
network security monitoring
100.
numerical association rule mining
101.
oil shale mining
102.
OSCE (Organization for Security and Co-operation in Europe)
103.
passenger’s security
104.
pattern mining for event logs
105.
pattern mining from event logs
106.
pattern mining from log files
107.
policy-based routing security
108.
political and security cultures
109.
post-mining land use
110.
post-quantum security
111.
power system security
112.
quantitative association rule mining
113.
quantitative security
114.
regional security
115.
RISC-V Security Verification
116.
room-and-pillar mining
117.
Safety and Security in Sea Transportation
118.
safety and security testing
119.
security
120.
security adaptation
121.
security alert prioritization
122.
security analysis
123.
security and justice (AFSJ)
124.
Security and political science
125.
security and privacy
126.
security and privacy in smart grids
127.
security closure
128.
Security Coverage
129.
security dataset
130.
security dilemma
131.
Security evaluation
132.
security evaluation instruments
133.
Security Level Evaluation
134.
Security limitations
135.
security log analysis
136.
security management
137.
security model
138.
security monitoring
139.
security notion
140.
security objectives
141.
security of data
142.
security of supply
143.
security operation center
144.
security operations center
145.
security patterns
146.
security policy
147.
security problem definition
148.
security proof
149.
security protocols
150.
security requirements
151.
security requirements engineering
152.
security research
153.
security risk assessment
154.
security risk management
155.
security risks
156.
security science and technology
157.
security strategies
158.
security systems for military objects
159.
security testing
160.
security training
161.
security verification
162.
security-by-design
163.
selective mining
164.
social security planning
165.
societal security
166.
software security
167.
software security level
168.
software security subcharacteristics
169.
space mining
170.
sufficient level of security
171.
sustainable mining
172.
system of economic security
173.
system security
174.
terrorism security
175.
text mining
176.
transmission System Security
177.
underground mining
178.
web usage mining
179.
voting privacy and security
180.
vulnerability mining
181.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT