Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security analysis (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/589)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Adaptive and efficient federated distillation with selective homomorphic encryption for edge AI
Rahbari, Dadmehr
;
Daneshtalab, Masoud
;
Jenihhin, Maksim
Expert Systems with Applications
2026
/
art. 131002
https://doi.org/10.1016/j.eswa.2025.131002
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
Threat modeling of industrial control systems: A systematic literature review
Khalil, Shaymaa Mamdouh
;
Bahsi, Hayretdin
;
Korõtko, Tarmo
Computers and security
2024
/
art. 103543, 19 p. : ill
https://doi.org/10.1016/j.cose.2023.103543
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
587
1.
security analysis
2.
security log analysis
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion
77.
Security Assertion Mining
78.
security closure
79.
Security Coverage
80.
security dataset
81.
security dilemma
82.
Security evaluation
83.
security evaluation instruments
84.
Security Level Evaluation
85.
Security limitations
86.
security management
87.
security model
88.
security monitoring
89.
security notion
90.
security objectives
91.
security of data
92.
security of supply
93.
security operation center
94.
security operations center
95.
security patterns
96.
security policy
97.
security problem definition
98.
security proof
99.
security protocols
100.
security requirements
101.
security requirements engineering
102.
security research
103.
security risk assessment
104.
security risk management
105.
security risks
106.
security science and technology
107.
security strategies
108.
security systems for military objects
109.
security testing
110.
security training
111.
security verification
112.
security-by-design
113.
social security planning
114.
societal security
115.
software security
116.
software security level
117.
software security subcharacteristics
118.
sufficient level of security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
124.
ABC analysis
125.
AC analysis
126.
accident analysis
127.
accuracy analysis
128.
acoustic analysis
129.
acoustic signal analysis
130.
activation analysis
131.
algebraic analysis
132.
amino acids analysis
133.
analysis
134.
analysis costs
135.
analysis methods
136.
analysis model
137.
analysis patterns
138.
analysis software
139.
analysis structuring
140.
analytical analysis
141.
analytical flow network analysis
142.
application analysis
143.
asymptotic analysis
144.
audio signal analysis
145.
autocorrelation analysis
146.
bandwidth analysis
147.
banking analysis
148.
barrier analysis
149.
benchmark analysis
150.
bibliometric analysis
151.
big data analysis
152.
big graph analysis
153.
Biochemical analysis
154.
bioelectrical impedance analysis
155.
bioinformatic analysis
156.
biomass composition analysis
157.
Bland-Altman analysis
158.
break-even analysis
159.
Buckling analysis
160.
business analysis
161.
business process analysis
162.
C. Numerical analysis
163.
cache vulnerability analysis
164.
calculation analysis
165.
case analysis methodology
166.
cash flow analysis
167.
cash-based analysis
168.
Choice-Based Conjoint analysis
169.
circuit analysis
170.
citation analysis
171.
climate analysis
172.
cluster analysis
173.
clustering analysis
174.
CO2 concentration analysis
175.
co-citation analysis
176.
comparative analysis
177.
competition analysis
178.
component dependency analysis
179.
Computational Fluid Dynamics (CFD) analysis
180.
conceptual framework for safety/risk analysis
181.
conformational analysis
182.
content analysis
183.
control system analysis
184.
Convergence analysis
185.
correlation analysis
186.
Cost & benefit analysis
187.
cost analysis
188.
cost benefit analysis
189.
cost efficiency analysis
190.
cost-benefit analysis
191.
cost-effectiveness analysis
192.
costing analysis cataloging processes
193.
country analysis model
194.
coupled and decoupled analysis
195.
co-word analysis
196.
critical disclosure analysis
197.
critical discourse analysis
198.
cross-lagged analysis
199.
cross-language analysis
200.
cryoelectron microscopy single-particle analysis
201.
curricula content analysis
202.
dairy product analysis
203.
data analysis
204.
data envelopment analysis
205.
defect and failure analysis
206.
dependency analysis
207.
descriptive sensory analysis
208.
determinacy analysis
209.
detrended fluctuation analysis (DFA)
210.
deviation analysis
211.
DFM analysis
212.
Differential Power Analysis (DPA)
213.
differential thermal analysis (DTA)
214.
digital image analysis
215.
discrete analysis
216.
discrete spectral analysis
217.
discriminant analysis
218.
dispersion analysis
219.
dissipation analysis
220.
domain analysis
221.
domain analysis and engineering
222.
donor behavior analysis
223.
droplet analysis
224.
droplet digital image analysis
225.
DuPont analysis
226.
dynamic analysis
227.
dynamic handwriting analysis
228.
EBSD analysis
229.
econometric analysis
230.
economic analysis
231.
economic feasibility analysis
232.
Economic growth and aggregate productivity regional government analysis
233.
EEG analysis
234.
efficiency analysis
235.
efficiency map analysis
236.
Eigenvalue analysis
237.
electric machine analysis computing
238.
electric network analysis
239.
electromagnetic analysis
240.
electron backscattered diffraction analysis
241.
elemental analysis
242.
ELF Binary Analysis
243.
empirical analysis
244.
energy system analysis
245.
Enrichment analysis
246.
enterprise analysis model (EAM)
247.
enterprise data analysis
248.
environmental analysis
249.
EOF analysis
250.
epistemological analysis
251.
error analysis
252.
event log analysis
253.
evolved gas analysis
254.
Evolved gas analysis (EGA)
255.
ex post analysis
256.
experimental analysis
257.
experimental modal analysis
258.
explicit analysis
259.
exploratory analysis
260.
exploratory data analysis
261.
extreme value analysis
262.
factor analysis
263.
failure analysis
264.
Failure mode and effect analysis (FMEA)
265.
failure modes and effect analysis
266.
fast independent component analysis
267.
fault analysis
268.
fault analysis model
269.
fault tree analysis
270.
FE analysis
271.
FEA analysis
272.
feasibility analysis
273.
feature analysis
274.
FEM analysis
275.
financial statement analysis
276.
fingerprint analysis
277.
finite element (FE) analysis
278.
finite element analysis
279.
finite element analysis (FEA)
280.
finite element analysis benchmarking
281.
finite-element (FE) analysis
282.
finite-element analysis
283.
flow analysis
284.
flow network analysis
285.
Flux balance analysis
286.
flux balance analysis biotechnological processes
287.
food analysis
288.
forensic analysis
289.
forensic soil analysis
290.
formal concept analysis
291.
Fourier analysis
292.
fractal analysis
293.
framing analysis
294.
free vibration analysis
295.
frequency analysis
296.
frequency domain analysis
297.
frequency response analysis
298.
frequency transform analysis
299.
frequency-domain analysis
300.
functional data analysis
301.
functional gene analysis
302.
functional institutional analysis
303.
fuzzy set qualitative comparative analysis (fsQCA)
304.
Fuzzy-Set Qualitative comparative analysis
305.
gait analysis
306.
gap analysis
307.
gate-level analysis
308.
GC/MS analysis
309.
genome-wide analysis
310.
geospatial analysis
311.
girder analysis
312.
GIS analysis
313.
grading analysis
314.
grain-size analysis
315.
grounding damage analysis
316.
harmonic analysis
317.
hierarchical cluster analysis (statistics)
318.
hierarchical timing analysis
319.
hierarchical two-level analysis
320.
high-speed thermogravimetric analysis
321.
high-temperature differential thermal analysis (HDTA)
322.
high-throughput analysis
323.
human motion analysis
324.
identity structure analysis
325.
Identity Structure Analysis (ISA)
326.
image analysis
327.
impact analysis
328.
index number analysis
329.
inductive qualitative content analysis
330.
information analysis
331.
innovative support analysis
332.
input-output analysis
333.
institutional analysis
334.
integrated system of performance analysis
335.
international comparative analysis
336.
intsitutional analysis
337.
investment analysis
338.
investment impact analysis
339.
isogeometric analysis
340.
kinetic analysis
341.
Lagrangian analysis
342.
landscape analysis
343.
learning analysis
344.
life cycle analysis
345.
life cycle analysis (LCA)
346.
life cycle cost analysis (LCCA)
347.
life-cycle cost analysis
348.
lifetime analysis
349.
linguistic analysis
350.
link analysis
351.
literature analysis
352.
lithofacies analysis
353.
load-bearing analysis
354.
log file analysis
355.
logical analysis
356.
logico-phaneroscopical analysis
357.
long-term performance analysis
358.
Lyapunov analysis
359.
machinery utilization analysis
360.
macroeconomic analysis
361.
macrofossil analysis
362.
MALDI-TOF mass spectrometry analysis
363.
malware analysis
364.
map analysis
365.
market analysis
366.
market basket analysis
367.
mass analysis
368.
Material flow analysis
369.
materials computational analysis
370.
mathematical analysis
371.
matrix analysis
372.
mediation analysis
373.
melissopalynological analysis
374.
meta-analysis
375.
metabolic control analysis
376.
metabolic flux analysis
377.
metabolic pathways analysis
378.
metagenetic analysis
379.
metagenome analysis
380.
Metagenomic analysis
381.
metallographic analysis
382.
metaphors in analysis
383.
meta-regression analysis
384.
method of analysis
385.
method of signature analysis of outgoing traffic
386.
methods: data analysis
387.
MICMAC analysis
388.
microarray analysis
389.
microfacies analysis
390.
microscope analysis
391.
microscopy image analysis
392.
microstructural analysis
393.
milk analysis
394.
mixing analysis
395.
modal analysis
396.
Module Analysis
397.
Monetary policy analysis
398.
Monte Carlo analysis
399.
morphotectonic analysis
400.
motion analysis
401.
motor current signature analysis
402.
multi scale analysis
403.
multi-country analysis
404.
multicriteria analysis
405.
multi-criteria analysis
406.
Multi-criteria decision analysis
407.
multi-criteria-analysis
408.
multifractal analysis
409.
multiphysics analysis
410.
Multiple criteria analysis
411.
multiple factorial analysis
412.
multivariate analysis
413.
multivariate data analysis
414.
mutation analysis
415.
network analysis
416.
noise analysis
417.
non-Archimedean analysis
418.
non-commutative complex analysis
419.
nonlinear analysis
420.
numerical analysis
421.
organic residue analysis
422.
package test analysis
423.
paper micro-zone analysis
424.
parametric multi-impact analysis
425.
Pareto front analysis
426.
particle size analysis
427.
PCA analysis
428.
peptide analysis
429.
performance analysis
430.
performance analysis reconfigurable architectures
431.
PESTEL analysis
432.
phenotypic analysis
433.
phylogenetic analysis
434.
pollen analysis
435.
popularity analysis
436.
post-analysis of rules
437.
power mismatch analysis
438.
power system analysis computing
439.
predictive analysis
440.
principal component analysis
441.
principal component analysis (PCA)
442.
probabilistic analysis
443.
profitability analysis
444.
program analysis
445.
proximity analysis
446.
pulse analysis
447.
Pulse shape analysis
448.
pulse wave analysis
449.
pulse waveform analysis
450.
qualitative analysis
451.
qualitative and quantitative analysis
452.
qualitative comparison analysis
453.
qualitative network analysis
454.
quantitative analysis
455.
quantitative chemical analysis
456.
quantitative metal analysis
457.
quantitative risk analysis
458.
quantitative XRD analysis
459.
quasi steady state (QSS) analysis
460.
quasi-static analysis
461.
Raman analysis
462.
ramp behavior analysis
463.
ramping behaviour analysis
464.
ratio analysis
465.
Real-time Analysis
466.
real-time vibration analysis
467.
regression analysis
468.
Regression tree analysis
469.
reliability analysis
470.
risk analysis
471.
risk preference analysis
472.
robot-cell performance analysis
473.
robust stability analysis
474.
robustness analysis
475.
RTL analysis
476.
scenario analysis
477.
self-analysis
478.
SEM analysis
479.
SEM-analysis
480.
sensitivity analysis
481.
Sensors modeling and analysis
482.
sensory analysis
483.
sentiment analysis
484.
sequence analysis
485.
signal analysis
486.
similarity analysis
487.
simulation analysis
488.
simulation and analysis
489.
Simultaneous thermogravimetry (TG) and differential thermal analysis (DTA)
490.
single crystal analysis
491.
singular spectrum analysis (SSA)
492.
situational analysis
493.
sobol sensitivity analysis
494.
social network analysis
495.
social-economic analysis
496.
sociotechnical analysis
497.
spatial analysis
498.
spatial data analysis
499.
spatio-temporal analysis
500.
spectral analysis
501.
spectrogram analysis
502.
Spectrophotometric analysis
503.
spectrum analysis
504.
spore and pollen analysis
505.
stability analysis
506.
stable isotope analysis
507.
stakeholder analysis
508.
static analysis
509.
static timing analysis
510.
statistical analysis
511.
steady state analysis
512.
steady-state analysis
513.
steady‐state growth space analysis
514.
stedy-state analysis
515.
strength analysis
516.
string analysis
517.
structural analysis
518.
structural decomposition analysis
519.
structure computer analysis
520.
student data analysis
521.
suitability analysis
522.
surface wave analysis
523.
survival analysis
524.
SWOT analysis
525.
symbolic data analysis
526.
symmetry analysis
527.
synchronous reluctance motors thermal analysis
528.
system analysis
529.
system analysis and design
530.
system integrated analysis
531.
system-level analysis
532.
systems integrated analysis
533.
systems-theoretic process analysis (STPA)
534.
task analysis
535.
taste dilution analysis
536.
technical analysis
537.
technoeconomic analysis
538.
Techno-economic analysis
539.
technology analysis
540.
TEM and SEM analysis
541.
TEM-analysis
542.
term-frequency analysis
543.
testability analysis
544.
texture profile analysis
545.
the accuracy of monitoring in analysis of impact impulses
546.
thematic analysis
547.
thematic content analysis
548.
theoretical analysis
549.
thermal analysis
550.
thermal analysis tool
551.
thermodynamic analysis
552.
thermoeconomic analysis
553.
thermogravimetric analysis
554.
time analysis
555.
time domain analysis
556.
time series analysis
557.
timing analysis
558.
tolerance analysis
559.
topographic analysis
560.
training needs analysis
561.
Transdermal analysis patch
562.
transformer analysis
563.
transient analysis
564.
trend analysis
565.
uncertainty analysis
566.
urban analysis
567.
user click behaviour analysis
568.
value network analysis
569.
water analysis
570.
waveform analysis
571.
wavelet analysis
572.
weak signal analysis
573.
wear analysis
574.
western blot analysis
575.
vibrational analysis
576.
wind analysis
577.
visco-thermal analysis
578.
visits registration and statistical analysis
579.
work analysis
580.
X-ray analysis
581.
X-ray crystallographic analysis
582.
X-ray line-profile analysis
583.
XRD structure analysis
584.
XYZ analysis
585.
(computational fluid dynamics) CFD analysis
586.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
587.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT