Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security risk assessment (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TTÜ subject term
TTÜ department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/263)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
259
1.
security risk assessment
2.
security risk management
3.
ecological risk assessment
4.
environmental risk assessment
5.
military environment risk assessment
6.
models for risk assessment
7.
risk assessment
8.
risk assessment chemicals in the air
9.
semi-quantitative risk assessment method
10.
at-risk-of-poverty rates
11.
bank risk-taking
12.
bank-risk taking
13.
bankruptcy risk
14.
cancer risk
15.
cardiovascular risk
16.
cardiovascular risk factors
17.
climatic risk
18.
coastal risk index
19.
conditional value at risk (CVaR)
20.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
21.
credit risk
22.
credit risk determinants
23.
cyber risk
24.
disaster risk reduction
25.
Economic risk
26.
elimination of risk
27.
environmental risk
28.
ESG risk
29.
farmer's risk criterion
30.
fish injury and mortality risk
31.
flood risk management
32.
health risk
33.
heart disease risk factors
34.
infection risk
35.
infection risk-based ventilation
36.
insurance risk
37.
kardiovaskulaarne risk
38.
knowledge risk
39.
knowledge risk management
40.
knowledge risk management (KRM)
41.
knowledge risk management in banking
42.
knowledge risk management in construction
43.
knowledge risk management in SMEs
44.
mould growth risk
45.
mould risk
46.
multi-risk/multi-criteria
47.
operational knowledge risk
48.
overheating risk
49.
perceived risk
50.
Polygenic risk score
51.
portfolio risk hedging
52.
potential risk
53.
pre-symptomatic period risk control
54.
proactive risk management
55.
process risk
56.
project risk management
57.
psychosocial risk factors
58.
quantitative risk analysis
59.
reactive risk management
60.
residual cardiovascular risk
61.
risk
62.
risk group for mental disorders
63.
risk allocation
64.
risk analysis
65.
risk assessments
66.
risk attitudes
67.
risk behavior
68.
risk classification
69.
risk evaluation model
70.
risk evaluation model development
71.
risk factors
72.
risk governance
73.
risk interdependence
74.
risk levels
75.
risk management
76.
risk management culture
77.
risk management in public organizations
78.
risk management model
79.
risk mitigation
80.
risk modelling
81.
risk of failure
82.
risk of mould growth
83.
risk prediction
84.
risk preference analysis
85.
risk prevention
86.
risk stratification
87.
risk transfer
88.
risk-adjusted performance
89.
risk-taking
90.
situational risk awareness
91.
standalone risk
92.
supply chain risk
93.
supply chain risk management
94.
systemic risk
95.
value at risk
96.
vascular risk factors
97.
3D risk assesment
98.
ad-hoc sensor networks security
99.
Blockchain security
100.
cache security
101.
communication system security
102.
comprehensive system of economic security
103.
computer security
104.
cooperative security dilemma
105.
cyber security
106.
cyber security education
107.
cyber security exercises
108.
cyber security strategies
109.
cyber-security
110.
data security
111.
development of security cameras
112.
drinking water security
113.
economic security
114.
economic security of enterprise
115.
emotional security
116.
energy security
117.
energy security indicator
118.
graded security
119.
hardware security
120.
hardware security primitive
121.
human security
122.
information security
123.
internal security
124.
international security
125.
investment and innovation security
126.
IPv6 security
127.
IT security
128.
job security
129.
long-term security
130.
metadata model for security measures
131.
Middle Eastern security
132.
Mobile security
133.
national cyber security strategy
134.
national security
135.
NATO. Science for Peace and Security Program
136.
network security
137.
network security monitoring
138.
OSCE (Organization for Security and Co-operation in Europe)
139.
passenger’s security
140.
policy-based routing security
141.
political and security cultures
142.
post-quantum security
143.
power system security
144.
quantitative security
145.
regional security
146.
security
147.
security and privacy
148.
security and privacy in smart grids
149.
security closure
150.
Security Coverage
151.
security dataset
152.
security dilemma
153.
Security evaluation
154.
security log analysis
155.
security management
156.
security model
157.
security monitoring
158.
security notion
159.
security objectives
160.
security of data
161.
security of supply
162.
security operation center
163.
security patterns
164.
security problem definition
165.
security proof
166.
security protocols
167.
security requirements
168.
security requirements engineering
169.
security strategies
170.
security systems for military objects
171.
security testing
172.
security training
173.
security verification
174.
social security planning
175.
societal security
176.
system of economic security
177.
system security
178.
terrorism security
179.
transmission System Security
180.
voting privacy and security
181.
Accuracy Assessment
182.
assessment
183.
assessment category
184.
assessment error
185.
assessment methods
186.
assessment of calorific value and moisture content
187.
assessment of voltage unbalance emission
188.
assessment of voltage unbalance sources
189.
assessment schemes
190.
automated quality assessment
191.
bridge assessment
192.
building sustainability assessment
193.
clinical assessment
194.
coastal vulnerability assessment
195.
comparative assessment
196.
compliance assessment
197.
computer‐aided assessment
198.
condition assessment
199.
criticality assessment
200.
cumulative effects assessment
201.
cyber battle damage assessment
202.
cyber impact assessment
203.
DPSIR assessment framework
204.
early stage energy assessment
205.
economic regulation assessment
206.
energy assessment
207.
entrepreneurial ecosystem assessment
208.
environmental assessment
209.
environmental impact assessment
210.
Environmental impact assessment (EIA)
211.
environmental performance assessment and simulation
212.
failure consequence assessment
213.
fatigue assessment
214.
FIM + FAM (functional assessment measure)
215.
flow assessment methods
216.
gait assessment
217.
grounding damage assessment
218.
habitat assessment
219.
impact assessment
220.
in-situ assessment
221.
integrated assessment
222.
intellectualization of assessment
223.
life cycle assessment
224.
life cycle assessment (LCA)
225.
life cycle sustainability assessment
226.
lifecycle assessment
227.
life-cycle assessment
228.
m-assessment
229.
multiple criteria assessment
230.
nutrition assessment
231.
oocyte assessment
232.
outcomes assessment
233.
performance assessment
234.
policy assessment
235.
probabilistic assessment
236.
quality assessment
237.
remaining life assessment
238.
remaining lifetime assessment
239.
resiliency assessment
240.
resource assessment
241.
road safety impact assessment
242.
safety assessment tool
243.
Self assessment tool
244.
self-assessment
245.
self-assessment tool
246.
signal quality assessment
247.
skill assessment
248.
skills assessment
249.
Social impact assessment
250.
spatial glare assessment
251.
strategic environmental assessment
252.
sustainability assessment
253.
sustainability assessment (DSS-HS)
254.
sustainability assessment method
255.
sustainable assessment tools
256.
thermodynamic assessment
257.
training needs assessment
258.
visual assessment
259.
vulnerability assessment
subject term
4
1.
kardiovaskulaarne risk
2.
risk
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT