Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security analysis (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/583)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Threat modeling of industrial control systems: A systematic literature review
Khalil, Shaymaa Mamdouh
;
Bahsi, Hayretdin
;
Korõtko, Tarmo
Computers and security
2024
/
art. 103543, 19 p. : ill
https://doi.org/10.1016/j.cose.2023.103543
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
581
1.
security analysis
2.
security log analysis
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security and justice (AFSJ)
72.
Security and political science
73.
security and privacy
74.
security and privacy in smart grids
75.
Security Assertion Mining
76.
security closure
77.
Security Coverage
78.
security dataset
79.
security dilemma
80.
Security evaluation
81.
security evaluation instruments
82.
Security limitations
83.
security management
84.
security model
85.
security monitoring
86.
security notion
87.
security objectives
88.
security of data
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security research
100.
security risk assessment
101.
security risk management
102.
security risks
103.
security science and technology
104.
security strategies
105.
security systems for military objects
106.
security testing
107.
security training
108.
security verification
109.
security-by-design
110.
social security planning
111.
societal security
112.
software security
113.
software security level
114.
software security subcharacteristics
115.
sufficient level of security
116.
system of economic security
117.
system security
118.
terrorism security
119.
transmission System Security
120.
voting privacy and security
121.
ABC analysis
122.
AC analysis
123.
accuracy analysis
124.
acoustic analysis
125.
acoustic signal analysis
126.
activation analysis
127.
algebraic analysis
128.
amino acids analysis
129.
analysis
130.
analysis costs
131.
analysis methods
132.
analysis model
133.
analysis patterns
134.
analysis software
135.
analysis structuring
136.
analytical analysis
137.
analytical flow network analysis
138.
application analysis
139.
asymptotic analysis
140.
audio signal analysis
141.
autocorrelation analysis
142.
bandwidth analysis
143.
banking analysis
144.
barrier analysis
145.
benchmark analysis
146.
bibliometric analysis
147.
big data analysis
148.
big graph analysis
149.
Biochemical analysis
150.
bioelectrical impedance analysis
151.
bioinformatic analysis
152.
biomass composition analysis
153.
Bland-Altman analysis
154.
break-even analysis
155.
Buckling analysis
156.
business analysis
157.
business process analysis
158.
C. Numerical analysis
159.
cache vulnerability analysis
160.
calculation analysis
161.
case analysis methodology
162.
cash flow analysis
163.
cash-based analysis
164.
Choice-Based Conjoint analysis
165.
circuit analysis
166.
citation analysis
167.
climate analysis
168.
cluster analysis
169.
clustering analysis
170.
CO2 concentration analysis
171.
co-citation analysis
172.
comparative analysis
173.
competition analysis
174.
component dependency analysis
175.
Computational Fluid Dynamics (CFD) analysis
176.
conceptual framework for safety/risk analysis
177.
conformational analysis
178.
content analysis
179.
control system analysis
180.
Convergence analysis
181.
correlation analysis
182.
Cost & benefit analysis
183.
cost analysis
184.
cost benefit analysis
185.
cost efficiency analysis
186.
cost-benefit analysis
187.
cost-effectiveness analysis
188.
costing analysis cataloging processes
189.
country analysis model
190.
coupled and decoupled analysis
191.
co-word analysis
192.
critical disclosure analysis
193.
critical discourse analysis
194.
cross-lagged analysis
195.
cross-language analysis
196.
cryoelectron microscopy single-particle analysis
197.
curricula content analysis
198.
dairy product analysis
199.
data analysis
200.
data envelopment analysis
201.
defect and failure analysis
202.
dependency analysis
203.
descriptive sensory analysis
204.
determinacy analysis
205.
detrended fluctuation analysis (DFA)
206.
deviation analysis
207.
DFM analysis
208.
Differential Power Analysis (DPA)
209.
differential thermal analysis (DTA)
210.
digital image analysis
211.
discrete analysis
212.
discrete spectral analysis
213.
discriminant analysis
214.
dispersion analysis
215.
dissipation analysis
216.
domain analysis
217.
domain analysis and engineering
218.
donor behavior analysis
219.
droplet analysis
220.
droplet digital image analysis
221.
DuPont analysis
222.
dynamic analysis
223.
dynamic handwriting analysis
224.
EBSD analysis
225.
econometric analysis
226.
economic analysis
227.
economic feasibility analysis
228.
Economic growth and aggregate productivity regional government analysis
229.
EEG analysis
230.
efficiency analysis
231.
efficiency map analysis
232.
Eigenvalue analysis
233.
electric machine analysis computing
234.
electric network analysis
235.
electromagnetic analysis
236.
electron backscattered diffraction analysis
237.
elemental analysis
238.
ELF Binary Analysis
239.
empirical analysis
240.
energy system analysis
241.
Enrichment analysis
242.
enterprise analysis model (EAM)
243.
enterprise data analysis
244.
environmental analysis
245.
EOF analysis
246.
epistemological analysis
247.
error analysis
248.
event log analysis
249.
evolved gas analysis
250.
Evolved gas analysis (EGA)
251.
ex post analysis
252.
experimental analysis
253.
experimental modal analysis
254.
explicit analysis
255.
exploratory analysis
256.
exploratory data analysis
257.
extreme value analysis
258.
factor analysis
259.
failure analysis
260.
Failure mode and effect analysis (FMEA)
261.
failure modes and effect analysis
262.
fast independent component analysis
263.
fault analysis
264.
fault analysis model
265.
fault tree analysis
266.
FE analysis
267.
FEA analysis
268.
feasibility analysis
269.
feature analysis
270.
FEM analysis
271.
financial statement analysis
272.
fingerprint analysis
273.
finite element (FE) analysis
274.
finite element analysis
275.
finite element analysis (FEA)
276.
finite element analysis benchmarking
277.
finite-element (FE) analysis
278.
finite-element analysis
279.
flow analysis
280.
flow network analysis
281.
Flux balance analysis
282.
flux balance analysis biotechnological processes
283.
food analysis
284.
forensic analysis
285.
forensic soil analysis
286.
formal concept analysis
287.
Fourier analysis
288.
fractal analysis
289.
framing analysis
290.
free vibration analysis
291.
frequency analysis
292.
frequency domain analysis
293.
frequency response analysis
294.
frequency transform analysis
295.
frequency-domain analysis
296.
functional data analysis
297.
functional gene analysis
298.
functional institutional analysis
299.
fuzzy set qualitative comparative analysis (fsQCA)
300.
Fuzzy-Set Qualitative comparative analysis
301.
gait analysis
302.
gap analysis
303.
gate-level analysis
304.
GC/MS analysis
305.
genome-wide analysis
306.
geospatial analysis
307.
girder analysis
308.
GIS analysis
309.
grading analysis
310.
grain-size analysis
311.
grounding damage analysis
312.
harmonic analysis
313.
hierarchical cluster analysis (statistics)
314.
hierarchical timing analysis
315.
hierarchical two-level analysis
316.
high-speed thermogravimetric analysis
317.
high-temperature differential thermal analysis (HDTA)
318.
high-throughput analysis
319.
human motion analysis
320.
identity structure analysis
321.
Identity Structure Analysis (ISA)
322.
image analysis
323.
impact analysis
324.
index number analysis
325.
inductive qualitative content analysis
326.
information analysis
327.
innovative support analysis
328.
input-output analysis
329.
institutional analysis
330.
integrated system of performance analysis
331.
international comparative analysis
332.
intsitutional analysis
333.
investment analysis
334.
investment impact analysis
335.
isogeometric analysis
336.
kinetic analysis
337.
Lagrangian analysis
338.
landscape analysis
339.
learning analysis
340.
life cycle analysis
341.
life cycle analysis (LCA)
342.
life cycle cost analysis (LCCA)
343.
life-cycle cost analysis
344.
lifetime analysis
345.
linguistic analysis
346.
link analysis
347.
literature analysis
348.
lithofacies analysis
349.
load-bearing analysis
350.
log file analysis
351.
logical analysis
352.
logico-phaneroscopical analysis
353.
long-term performance analysis
354.
Lyapunov analysis
355.
machinery utilization analysis
356.
macroeconomic analysis
357.
macrofossil analysis
358.
MALDI-TOF mass spectrometry analysis
359.
malware analysis
360.
map analysis
361.
market analysis
362.
market basket analysis
363.
mass analysis
364.
Material flow analysis
365.
materials computational analysis
366.
mathematical analysis
367.
matrix analysis
368.
mediation analysis
369.
melissopalynological analysis
370.
meta-analysis
371.
metabolic control analysis
372.
metabolic flux analysis
373.
metabolic pathways analysis
374.
metagenetic analysis
375.
metagenome analysis
376.
Metagenomic analysis
377.
metallographic analysis
378.
metaphors in analysis
379.
meta-regression analysis
380.
method of analysis
381.
method of signature analysis of outgoing traffic
382.
methods: data analysis
383.
MICMAC analysis
384.
microarray analysis
385.
microfacies analysis
386.
microscope analysis
387.
microscopy image analysis
388.
microstructural analysis
389.
milk analysis
390.
mixing analysis
391.
modal analysis
392.
Module Analysis
393.
Monetary policy analysis
394.
Monte Carlo analysis
395.
morphotectonic analysis
396.
motion analysis
397.
motor current signature analysis
398.
multi scale analysis
399.
multi-country analysis
400.
multicriteria analysis
401.
multi-criteria analysis
402.
Multi-criteria decision analysis
403.
multi-criteria-analysis
404.
multifractal analysis
405.
multiphysics analysis
406.
Multiple criteria analysis
407.
multiple factorial analysis
408.
multivariate analysis
409.
multivariate data analysis
410.
mutation analysis
411.
network analysis
412.
noise analysis
413.
non-Archimedean analysis
414.
non-commutative complex analysis
415.
nonlinear analysis
416.
numerical analysis
417.
organic residue analysis
418.
package test analysis
419.
paper micro-zone analysis
420.
parametric multi-impact analysis
421.
Pareto front analysis
422.
particle size analysis
423.
PCA analysis
424.
peptide analysis
425.
performance analysis
426.
performance analysis reconfigurable architectures
427.
PESTEL analysis
428.
phenotypic analysis
429.
phylogenetic analysis
430.
pollen analysis
431.
popularity analysis
432.
post-analysis of rules
433.
power mismatch analysis
434.
power system analysis computing
435.
predictive analysis
436.
principal component analysis
437.
principal component analysis (PCA)
438.
probabilistic analysis
439.
profitability analysis
440.
program analysis
441.
pulse analysis
442.
Pulse shape analysis
443.
pulse wave analysis
444.
pulse waveform analysis
445.
qualitative analysis
446.
qualitative and quantitative analysis
447.
qualitative comparison analysis
448.
quantitative analysis
449.
quantitative chemical analysis
450.
quantitative metal analysis
451.
quantitative risk analysis
452.
quantitative XRD analysis
453.
quasi steady state (QSS) analysis
454.
quasi-static analysis
455.
Raman analysis
456.
ramp behavior analysis
457.
ramping behaviour analysis
458.
ratio analysis
459.
Real-time Analysis
460.
real-time vibration analysis
461.
regression analysis
462.
Regression tree analysis
463.
reliability analysis
464.
risk analysis
465.
risk preference analysis
466.
robot-cell performance analysis
467.
robust stability analysis
468.
robustness analysis
469.
RTL analysis
470.
scenario analysis
471.
self-analysis
472.
SEM analysis
473.
SEM-analysis
474.
sensitivity analysis
475.
Sensors modeling and analysis
476.
sensory analysis
477.
sentiment analysis
478.
sequence analysis
479.
signal analysis
480.
similarity analysis
481.
simulation analysis
482.
simulation and analysis
483.
Simultaneous thermogravimetry (TG) and differential thermal analysis (DTA)
484.
single crystal analysis
485.
singular spectrum analysis (SSA)
486.
situational analysis
487.
sobol sensitivity analysis
488.
social network analysis
489.
social-economic analysis
490.
sociotechnical analysis
491.
spatial analysis
492.
spatial data analysis
493.
spatio-temporal analysis
494.
spectral analysis
495.
spectrogram analysis
496.
Spectrophotometric analysis
497.
spectrum analysis
498.
spore and pollen analysis
499.
stability analysis
500.
stable isotope analysis
501.
stakeholder analysis
502.
static analysis
503.
static timing analysis
504.
statistical analysis
505.
steady state analysis
506.
steady-state analysis
507.
steady‐state growth space analysis
508.
stedy-state analysis
509.
strength analysis
510.
string analysis
511.
structural analysis
512.
structural decomposition analysis
513.
structure computer analysis
514.
student data analysis
515.
suitability analysis
516.
surface wave analysis
517.
survival analysis
518.
SWOT analysis
519.
symbolic data analysis
520.
symmetry analysis
521.
synchronous reluctance motors thermal analysis
522.
system analysis
523.
system analysis and design
524.
system integrated analysis
525.
system-level analysis
526.
systems integrated analysis
527.
systems-theoretic process analysis (STPA)
528.
task analysis
529.
taste dilution analysis
530.
technical analysis
531.
technoeconomic analysis
532.
Techno-economic analysis
533.
technology analysis
534.
TEM and SEM analysis
535.
TEM-analysis
536.
term-frequency analysis
537.
testability analysis
538.
texture profile analysis
539.
the accuracy of monitoring in analysis of impact impulses
540.
thematic analysis
541.
thematic content analysis
542.
theoretical analysis
543.
thermal analysis
544.
thermal analysis tool
545.
thermodynamic analysis
546.
thermoeconomic analysis
547.
thermogravimetric analysis
548.
time analysis
549.
time domain analysis
550.
time series analysis
551.
timing analysis
552.
tolerance analysis
553.
topographic analysis
554.
training needs analysis
555.
Transdermal analysis patch
556.
transformer analysis
557.
transient analysis
558.
trend analysis
559.
uncertainty analysis
560.
urban analysis
561.
user click behaviour analysis
562.
value network analysis
563.
water analysis
564.
waveform analysis
565.
wavelet analysis
566.
weak signal analysis
567.
wear analysis
568.
western blot analysis
569.
vibrational analysis
570.
wind analysis
571.
visco-thermal analysis
572.
visits registration and statistical analysis
573.
work analysis
574.
X-ray analysis
575.
X-ray crystallographic analysis
576.
X-ray line-profile analysis
577.
XRD structure analysis
578.
XYZ analysis
579.
(computational fluid dynamics) CFD analysis
580.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
581.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT