Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security risk assessment (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/340)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
336
1.
security risk assessment
2.
security risk management
3.
Cardiovascular risk assessment
4.
ecological risk assessment
5.
environmental risk assessment
6.
machinery risk assessment
7.
military environment risk assessment
8.
models for risk assessment
9.
risk assessment
10.
risk assessment chemicals in the air
11.
rrivacy risk assessment
12.
semi-quantitative risk assessment method
13.
accrual-based credit risk model
14.
at-risk-of-poverty rates
15.
bank risk-taking
16.
bank-risk taking
17.
bankruptcy risk
18.
cancer risk
19.
cardiovascular risk
20.
cardiovascular risk factors
21.
climatic risk
22.
coastal risk index
23.
conceptual framework for safety/risk analysis
24.
conditional value at risk (CVaR)
25.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
26.
credit risk
27.
credit risk determinants
28.
credit risk forecasting
29.
credit risk modelling
30.
cyber risk
31.
cyber risk management in shipping
32.
disaster risk reduction
33.
Economic risk
34.
elimination of risk
35.
enterprise risk management
36.
environmental risk
37.
ergonomic risk
38.
ESG risk
39.
farmer's risk criterion
40.
fish injury and mortality risk
41.
flood risk management
42.
health risk
43.
heart disease risk factors
44.
infection risk
45.
infection risk calculators
46.
infection risk tools
47.
infection risk-based ventilation
48.
insurance risk
49.
kardiovaskulaarne risk
50.
knowledge risk
51.
knowledge risk management
52.
knowledge risk management (KRM)
53.
knowledge risk management in banking
54.
knowledge risk management in construction
55.
knowledge risk management in SMEs
56.
Moisture risk mitigation
57.
mould growth risk
58.
mould risk
59.
multi-risk/multi-criteria
60.
navigation risk
61.
navigation risk management course
62.
operational knowledge risk
63.
overheating risk
64.
perceived risk
65.
policy risk
66.
Polygenic risk score
67.
portfolio risk hedging
68.
potential risk
69.
pre-symptomatic period risk control
70.
proactive risk management
71.
process risk
72.
project risk management
73.
psychosocial risk factors
74.
quantitative risk analysis
75.
reactive risk management
76.
residual cardiovascular risk
77.
risk
78.
risk group for mental disorders
79.
risk allocation
80.
risk analysis
81.
risk assessments
82.
risk attitudes
83.
risk behavior
84.
risk classification
85.
risk evaluation model
86.
risk evaluation model development
87.
risk event chain analyses
88.
risk factors
89.
risk governance
90.
risk interdependence
91.
risk levels
92.
risk management
93.
risk management culture
94.
risk management in public organizations
95.
risk management model
96.
risk mitigation
97.
risk modelling
98.
risk of failure
99.
risk of mould growth
100.
risk prediction
101.
risk preference analysis
102.
risk prevention
103.
risk reduction
104.
risk stratification
105.
risk transfer
106.
risk-adjusted performance
107.
risk-based laws
108.
risk-based management
109.
risk-taking
110.
risk-taking behavior
111.
ship collision risk
112.
situational risk awareness
113.
standalone risk
114.
supply chain risk
115.
supply chain risk management
116.
systemic risk
117.
tourists’ perceived travel risk
118.
value at risk
119.
vascular risk factors
120.
3D risk assesment
121.
ad-hoc sensor networks security
122.
Automatic Security Verification
123.
Blockchain security
124.
cache security
125.
communication system security
126.
comprehensive system of economic security
127.
computer security
128.
cooperative security dilemma
129.
cyber security
130.
cyber security education
131.
cyber security exercises
132.
cyber security monitoring
133.
cyber security strategies
134.
cyber-security
135.
data and information security
136.
data security
137.
development of security cameras
138.
digital security practices
139.
drinking water security
140.
economic security
141.
economic security of enterprise
142.
emotional security
143.
energy security
144.
energy security indicator
145.
Estonian information security standard
146.
graded security
147.
hardware security
148.
hardware security primitive
149.
high level of security
150.
Homeland security
151.
human security
152.
information security
153.
information security and privacy
154.
initial level of security
155.
internal security
156.
international security
157.
investment and innovation security
158.
IPv6 security
159.
IT security
160.
IT security management
161.
job security
162.
long-term security
163.
maritime cyber security
164.
maritime cyber security operations centers
165.
Maritime Security Operations Center (M-SOC)
166.
medium level of security
167.
metadata model for security measures
168.
Middle Eastern security
169.
Mobile security
170.
national cyber security strategy
171.
national security
172.
NATO. Science for Peace and Security Program
173.
network security
174.
network security monitoring
175.
OSCE (Organization for Security and Co-operation in Europe)
176.
passenger’s security
177.
policy-based routing security
178.
political and security cultures
179.
post-quantum security
180.
power system security
181.
quantitative security
182.
regional security
183.
RISC-V Security Verification
184.
Safety and Security in Sea Transportation
185.
safety and security testing
186.
security
187.
security adaptation
188.
security alert prioritization
189.
security analysis
190.
security and justice (AFSJ)
191.
Security and political science
192.
security and privacy
193.
security and privacy in smart grids
194.
Security Assertion Mining
195.
security closure
196.
Security Coverage
197.
security dataset
198.
security dilemma
199.
Security evaluation
200.
security evaluation instruments
201.
Security limitations
202.
security log analysis
203.
security management
204.
security model
205.
security monitoring
206.
security notion
207.
security objectives
208.
security of data
209.
security of supply
210.
security operation center
211.
security operations center
212.
security patterns
213.
security policy
214.
security problem definition
215.
security proof
216.
security protocols
217.
security requirements
218.
security requirements engineering
219.
security research
220.
security risks
221.
security science and technology
222.
security strategies
223.
security systems for military objects
224.
security testing
225.
security training
226.
security verification
227.
security-by-design
228.
social security planning
229.
societal security
230.
software security
231.
software security level
232.
software security subcharacteristics
233.
sufficient level of security
234.
system of economic security
235.
system security
236.
terrorism security
237.
transmission System Security
238.
voting privacy and security
239.
Accuracy Assessment
240.
assessment
241.
assessment and testing
242.
assessment category
243.
assessment error
244.
assessment method
245.
assessment methods
246.
assessment of calorific value and moisture content
247.
assessment of voltage unbalance emission
248.
assessment of voltage unbalance sources
249.
assessment schemes
250.
automated quality assessment
251.
bridge assessment
252.
building sustainability assessment
253.
clinical assessment
254.
coastal vulnerability assessment
255.
comparative assessment
256.
compliance assessment
257.
computer‐aided assessment
258.
condition assessment
259.
consistency assessment
260.
criticality assessment
261.
cumulative effects assessment
262.
cyber battle damage assessment
263.
cyber impact assessment
264.
Design and assessment methods
265.
dietary assessment
266.
DPSIR assessment framework
267.
early stage energy assessment
268.
early-stage lifecycle assessment integration
269.
E-assessment
270.
economic regulation assessment
271.
energy assessment
272.
entrepreneurial ecosystem assessment
273.
environmental assessment
274.
environmental impact assessment
275.
Environmental impact assessment (EIA)
276.
environmental performance assessment and simulation
277.
expert assessment
278.
failure consequence assessment
279.
fatigue assessment
280.
FIM + FAM (functional assessment measure)
281.
flow assessment methods
282.
gait assessment
283.
grounding damage assessment
284.
habitat assessment
285.
hazard assessment
286.
Image Quality Assessment
287.
impact assessment
288.
in-situ assessment
289.
integrated assessment
290.
intellectualization of assessment
291.
life cycle assessment
292.
life cycle assessment (LCA)
293.
life cycle sustainability assessment
294.
lifecycle assessment
295.
life-cycle assessment
296.
m-assessment
297.
material quality assessment
298.
multiple criteria assessment
299.
nutrition assessment
300.
oocyte assessment
301.
outcomes assessment
302.
performance assessment
303.
policy assessment
304.
probabilistic assessment
305.
quality assessment
306.
readiness assessment
307.
reliability assessment
308.
reliability assessment and enhancement
309.
remaining life assessment
310.
remaining lifetime assessment
311.
resilience assessment
312.
resiliency assessment
313.
resource assessment
314.
road safety impact assessment
315.
safety assessment tool
316.
Self assessment tool
317.
self-assessment
318.
self-assessment tool
319.
signal quality assessment
320.
skill assessment
321.
skills assessment
322.
skills assessment of programming and mathematics
323.
Social impact assessment
324.
spatial glare assessment
325.
strategic environmental assessment
326.
sustainability assessment
327.
sustainability assessment (DSS-HS)
328.
sustainability assessment method
329.
sustainable assessment tools
330.
techno-economic assessment
331.
thermodynamic assessment
332.
training needs assessment
333.
ultimate strength assessment
334.
wave energy resource assessment
335.
visual assessment
336.
vulnerability assessment
subject term
4
1.
kardiovaskulaarne risk
2.
risk
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT