Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security analysis (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/592)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Adaptive and efficient federated distillation with selective homomorphic encryption for edge AI
Rahbari, Dadmehr
;
Daneshtalab, Masoud
;
Jenihhin, Maksim
Expert Systems with Applications
2026
/
art. 131002
https://doi.org/10.1016/j.eswa.2025.131002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
Threat modeling of industrial control systems: A systematic literature review
Khalil, Shaymaa Mamdouh
;
Bahsi, Hayretdin
;
Korõtko, Tarmo
Computers and security
2024
/
art. 103543, 19 p. : ill
https://doi.org/10.1016/j.cose.2023.103543
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
590
1.
security analysis
2.
security log analysis
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security monitoring in maritime
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
data and information security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
economic security
26.
economic security of enterprise
27.
emotional security
28.
energy security
29.
energy security indicator
30.
Estonian information security standard
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
information security
38.
information security and privacy
39.
initial level of security
40.
internal security
41.
international security
42.
investment and innovation security
43.
IPv6 security
44.
IT security
45.
IT security management
46.
job security
47.
long-term security
48.
maritime cyber security
49.
maritime cyber security operations centers
50.
Maritime Security Operations Center (M-SOC)
51.
medium level of security
52.
metadata model for security measures
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
network security
59.
network security monitoring
60.
OSCE (Organization for Security and Co-operation in Europe)
61.
passenger’s security
62.
policy-based routing security
63.
political and security cultures
64.
post-quantum security
65.
power system security
66.
quantitative security
67.
regional security
68.
RISC-V Security Verification
69.
Safety and Security in Sea Transportation
70.
safety and security testing
71.
security
72.
security adaptation
73.
security alert prioritization
74.
security and justice (AFSJ)
75.
Security and political science
76.
security and privacy
77.
security and privacy in smart grids
78.
Security Assertion
79.
Security Assertion Mining
80.
security closure
81.
Security Coverage
82.
security dataset
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system of economic security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
ABC analysis
127.
AC analysis
128.
accident analysis
129.
accuracy analysis
130.
acoustic analysis
131.
acoustic signal analysis
132.
activation analysis
133.
algebraic analysis
134.
amino acids analysis
135.
analysis
136.
analysis costs
137.
analysis methods
138.
analysis model
139.
analysis patterns
140.
analysis software
141.
analysis structuring
142.
analytical analysis
143.
analytical flow network analysis
144.
application analysis
145.
asymptotic analysis
146.
audio signal analysis
147.
autocorrelation analysis
148.
bandwidth analysis
149.
banking analysis
150.
barrier analysis
151.
benchmark analysis
152.
bibliometric analysis
153.
big data analysis
154.
big graph analysis
155.
Biochemical analysis
156.
bioelectrical impedance analysis
157.
bioinformatic analysis
158.
biomass composition analysis
159.
Bland-Altman analysis
160.
break-even analysis
161.
Buckling analysis
162.
business analysis
163.
business process analysis
164.
C. Numerical analysis
165.
cache vulnerability analysis
166.
calculation analysis
167.
carbon footprint analysis
168.
case analysis methodology
169.
cash flow analysis
170.
cash-based analysis
171.
Choice-Based Conjoint analysis
172.
circuit analysis
173.
citation analysis
174.
climate analysis
175.
cluster analysis
176.
clustering analysis
177.
CO2 concentration analysis
178.
co-citation analysis
179.
comparative analysis
180.
competition analysis
181.
component dependency analysis
182.
Computational Fluid Dynamics (CFD) analysis
183.
conceptual framework for safety/risk analysis
184.
conformational analysis
185.
content analysis
186.
control system analysis
187.
Convergence analysis
188.
correlation analysis
189.
Cost & benefit analysis
190.
cost analysis
191.
cost benefit analysis
192.
cost efficiency analysis
193.
cost-benefit analysis
194.
cost-effectiveness analysis
195.
costing analysis cataloging processes
196.
country analysis model
197.
coupled and decoupled analysis
198.
co-word analysis
199.
critical disclosure analysis
200.
critical discourse analysis
201.
cross-lagged analysis
202.
cross-language analysis
203.
cryoelectron microscopy single-particle analysis
204.
curricula content analysis
205.
dairy product analysis
206.
data analysis
207.
data envelopment analysis
208.
defect and failure analysis
209.
dependency analysis
210.
descriptive sensory analysis
211.
determinacy analysis
212.
detrended fluctuation analysis (DFA)
213.
deviation analysis
214.
DFM analysis
215.
Differential Power Analysis (DPA)
216.
differential thermal analysis (DTA)
217.
digital image analysis
218.
discrete analysis
219.
discrete spectral analysis
220.
discriminant analysis
221.
dispersion analysis
222.
dissipation analysis
223.
domain analysis
224.
domain analysis and engineering
225.
donor behavior analysis
226.
droplet analysis
227.
droplet digital image analysis
228.
DuPont analysis
229.
dynamic analysis
230.
dynamic handwriting analysis
231.
EBSD analysis
232.
econometric analysis
233.
economic analysis
234.
economic feasibility analysis
235.
Economic growth and aggregate productivity regional government analysis
236.
EEG analysis
237.
efficiency analysis
238.
efficiency map analysis
239.
Eigenvalue analysis
240.
electric machine analysis computing
241.
electric network analysis
242.
electromagnetic analysis
243.
electron backscattered diffraction analysis
244.
elemental analysis
245.
ELF Binary Analysis
246.
empirical analysis
247.
energy system analysis
248.
Enrichment analysis
249.
enterprise analysis model (EAM)
250.
enterprise data analysis
251.
environmental analysis
252.
EOF analysis
253.
epistemological analysis
254.
error analysis
255.
event log analysis
256.
evolved gas analysis
257.
Evolved gas analysis (EGA)
258.
ex post analysis
259.
experimental analysis
260.
experimental modal analysis
261.
explicit analysis
262.
exploratory analysis
263.
exploratory data analysis
264.
extreme value analysis
265.
factor analysis
266.
failure analysis
267.
Failure mode and effect analysis (FMEA)
268.
failure modes and effect analysis
269.
fast independent component analysis
270.
fault analysis
271.
fault analysis model
272.
fault tree analysis
273.
FE analysis
274.
FEA analysis
275.
feasibility analysis
276.
feature analysis
277.
FEM analysis
278.
financial statement analysis
279.
fingerprint analysis
280.
finite element (FE) analysis
281.
finite element analysis
282.
finite element analysis (FEA)
283.
finite element analysis benchmarking
284.
finite-element (FE) analysis
285.
finite-element analysis
286.
flow analysis
287.
flow network analysis
288.
Flux balance analysis
289.
flux balance analysis biotechnological processes
290.
food analysis
291.
forensic analysis
292.
forensic soil analysis
293.
formal concept analysis
294.
Fourier analysis
295.
fractal analysis
296.
framing analysis
297.
free vibration analysis
298.
frequency analysis
299.
frequency domain analysis
300.
frequency response analysis
301.
frequency transform analysis
302.
frequency-domain analysis
303.
functional data analysis
304.
functional gene analysis
305.
functional institutional analysis
306.
fuzzy set qualitative comparative analysis (fsQCA)
307.
Fuzzy-Set Qualitative comparative analysis
308.
gait analysis
309.
gap analysis
310.
gate-level analysis
311.
GC/MS analysis
312.
genome-wide analysis
313.
geospatial analysis
314.
girder analysis
315.
GIS analysis
316.
grading analysis
317.
grain-size analysis
318.
grounding damage analysis
319.
harmonic analysis
320.
hierarchical cluster analysis (statistics)
321.
hierarchical timing analysis
322.
hierarchical two-level analysis
323.
high-speed thermogravimetric analysis
324.
high-temperature differential thermal analysis (HDTA)
325.
high-throughput analysis
326.
human motion analysis
327.
identity structure analysis
328.
Identity Structure Analysis (ISA)
329.
image analysis
330.
impact analysis
331.
index number analysis
332.
inductive qualitative content analysis
333.
information analysis
334.
innovative support analysis
335.
input-output analysis
336.
institutional analysis
337.
integrated system of performance analysis
338.
international comparative analysis
339.
intsitutional analysis
340.
investment analysis
341.
investment impact analysis
342.
isogeometric analysis
343.
kinetic analysis
344.
Lagrangian analysis
345.
landscape analysis
346.
learning analysis
347.
life cycle analysis
348.
life cycle analysis (LCA)
349.
life cycle cost analysis (LCCA)
350.
life-cycle cost analysis
351.
lifetime analysis
352.
linguistic analysis
353.
link analysis
354.
literature analysis
355.
lithofacies analysis
356.
load-bearing analysis
357.
log file analysis
358.
logical analysis
359.
logico-phaneroscopical analysis
360.
long-term performance analysis
361.
Lyapunov analysis
362.
machinery utilization analysis
363.
macroeconomic analysis
364.
macrofossil analysis
365.
MALDI-TOF mass spectrometry analysis
366.
malware analysis
367.
map analysis
368.
market analysis
369.
market basket analysis
370.
mass analysis
371.
Material flow analysis
372.
materials computational analysis
373.
mathematical analysis
374.
matrix analysis
375.
mediation analysis
376.
melissopalynological analysis
377.
meta-analysis
378.
metabolic control analysis
379.
metabolic flux analysis
380.
metabolic pathways analysis
381.
metagenetic analysis
382.
metagenome analysis
383.
Metagenomic analysis
384.
metallographic analysis
385.
metaphors in analysis
386.
meta-regression analysis
387.
method of analysis
388.
method of signature analysis of outgoing traffic
389.
methods: data analysis
390.
MICMAC analysis
391.
microarray analysis
392.
microfacies analysis
393.
microscope analysis
394.
microscopy image analysis
395.
microstructural analysis
396.
milk analysis
397.
mixing analysis
398.
modal analysis
399.
Module Analysis
400.
Monetary policy analysis
401.
Monte Carlo analysis
402.
morphotectonic analysis
403.
motion analysis
404.
motor current signature analysis
405.
multi scale analysis
406.
multi-country analysis
407.
multicriteria analysis
408.
multi-criteria analysis
409.
Multi-criteria decision analysis
410.
multi-criteria-analysis
411.
multifractal analysis
412.
multiphysics analysis
413.
Multiple criteria analysis
414.
multiple factorial analysis
415.
multivariate analysis
416.
multivariate data analysis
417.
mutation analysis
418.
network analysis
419.
noise analysis
420.
non-Archimedean analysis
421.
non-commutative complex analysis
422.
nonlinear analysis
423.
numerical analysis
424.
organic residue analysis
425.
package test analysis
426.
paper micro-zone analysis
427.
parametric multi-impact analysis
428.
Pareto front analysis
429.
particle size analysis
430.
PCA analysis
431.
peptide analysis
432.
performance analysis
433.
performance analysis reconfigurable architectures
434.
PESTEL analysis
435.
phenotypic analysis
436.
phylogenetic analysis
437.
pollen analysis
438.
popularity analysis
439.
post-analysis of rules
440.
power mismatch analysis
441.
power system analysis computing
442.
predictive analysis
443.
principal component analysis
444.
principal component analysis (PCA)
445.
probabilistic analysis
446.
profitability analysis
447.
program analysis
448.
proximity analysis
449.
pulse analysis
450.
Pulse shape analysis
451.
pulse wave analysis
452.
pulse waveform analysis
453.
qualitative analysis
454.
qualitative and quantitative analysis
455.
qualitative comparison analysis
456.
qualitative network analysis
457.
quantitative analysis
458.
quantitative chemical analysis
459.
quantitative metal analysis
460.
quantitative risk analysis
461.
quantitative XRD analysis
462.
quasi steady state (QSS) analysis
463.
quasi-static analysis
464.
Raman analysis
465.
ramp behavior analysis
466.
ramping behaviour analysis
467.
ratio analysis
468.
Real-time Analysis
469.
real-time vibration analysis
470.
regression analysis
471.
Regression tree analysis
472.
reliability analysis
473.
risk analysis
474.
risk preference analysis
475.
robot-cell performance analysis
476.
robust stability analysis
477.
robustness analysis
478.
RTL analysis
479.
scenario analysis
480.
self-analysis
481.
SEM analysis
482.
SEM-analysis
483.
sensitivity analysis
484.
Sensors modeling and analysis
485.
sensory analysis
486.
sentiment analysis
487.
sequence analysis
488.
signal analysis
489.
similarity analysis
490.
simulation analysis
491.
simulation and analysis
492.
Simultaneous thermogravimetry (TG) and differential thermal analysis (DTA)
493.
single crystal analysis
494.
singular spectrum analysis (SSA)
495.
situational analysis
496.
sobol sensitivity analysis
497.
social network analysis
498.
social-economic analysis
499.
sociotechnical analysis
500.
spatial analysis
501.
spatial data analysis
502.
spatio-temporal analysis
503.
spectral analysis
504.
spectrogram analysis
505.
Spectrophotometric analysis
506.
spectrum analysis
507.
spore and pollen analysis
508.
stability analysis
509.
stable isotope analysis
510.
stakeholder analysis
511.
static analysis
512.
static timing analysis
513.
statistical analysis
514.
steady state analysis
515.
steady-state analysis
516.
steady‐state growth space analysis
517.
stedy-state analysis
518.
strength analysis
519.
string analysis
520.
structural analysis
521.
structural decomposition analysis
522.
structure computer analysis
523.
student data analysis
524.
suitability analysis
525.
surface wave analysis
526.
survival analysis
527.
SWOT analysis
528.
symbolic data analysis
529.
symmetry analysis
530.
synchronous reluctance motors thermal analysis
531.
system analysis
532.
system analysis and design
533.
system integrated analysis
534.
system-level analysis
535.
systems integrated analysis
536.
systems-theoretic process analysis (STPA)
537.
task analysis
538.
taste dilution analysis
539.
technical analysis
540.
technoeconomic analysis
541.
Techno-economic analysis
542.
technology analysis
543.
TEM and SEM analysis
544.
TEM-analysis
545.
term-frequency analysis
546.
testability analysis
547.
texture profile analysis
548.
the accuracy of monitoring in analysis of impact impulses
549.
thematic analysis
550.
thematic content analysis
551.
theoretical analysis
552.
thermal analysis
553.
thermal analysis tool
554.
thermodynamic analysis
555.
thermoeconomic analysis
556.
thermogravimetric analysis
557.
time analysis
558.
time domain analysis
559.
time series analysis
560.
timing analysis
561.
tolerance analysis
562.
topographic analysis
563.
training needs analysis
564.
Transdermal analysis patch
565.
transformer analysis
566.
transient analysis
567.
trend analysis
568.
uncertainty analysis
569.
urban analysis
570.
user click behaviour analysis
571.
value network analysis
572.
water analysis
573.
waveform analysis
574.
wavelet analysis
575.
weak signal analysis
576.
wear analysis
577.
western blot analysis
578.
vibrational analysis
579.
wind analysis
580.
visco-thermal analysis
581.
visits registration and statistical analysis
582.
work analysis
583.
X-ray analysis
584.
X-ray crystallographic analysis
585.
X-ray line-profile analysis
586.
XRD structure analysis
587.
XYZ analysis
588.
(computational fluid dynamics) CFD analysis
589.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
590.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT