Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security-by-design (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/439)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Threat modeling of industrial control systems: A systematic literature review
Khalil, Shaymaa Mamdouh
;
Bahsi, Hayretdin
;
Korõtko, Tarmo
Computers and security
2024
/
art. 103543, 19 p. : ill
https://doi.org/10.1016/j.cose.2023.103543
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
435
1.
security-by-design
2.
design methodology and human-centred design
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dataset
80.
security dilemma
81.
Security evaluation
82.
security evaluation instruments
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security operations center
94.
security patterns
95.
security policy
96.
security problem definition
97.
security proof
98.
security protocols
99.
security requirements
100.
security requirements engineering
101.
security research
102.
security risk assessment
103.
security risk management
104.
security risks
105.
security science and technology
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
Action design research
123.
algorithm design and theory
124.
algorithmic design
125.
analytical quality by design
126.
animation design
127.
architectural design
128.
argumentative design
129.
ASIC design
130.
Baroque garden design
131.
battery design
132.
Benign by design
133.
bioinspired design
134.
biomimetic design
135.
Box–Behnken experimental design methodology
136.
breakwater design
137.
building design
138.
building design management
139.
building performance design
140.
C design
141.
Central composite design
142.
ChatGPT in course design
143.
circuit design
144.
circuits design
145.
co-design
146.
co-design strategies
147.
collaborative design
148.
compatibility design techniques
149.
component design
150.
component-based design
151.
computational design
152.
computational design method
153.
computational design methods
154.
computational mechanics and design
155.
computer aided design
156.
computer-aided architectural design (CAAD)
157.
computer-aided design
158.
computer-aided design (CAD)
159.
conceptual design
160.
conformational design
161.
contract-based design
162.
control design
163.
control system design
164.
control systems design
165.
cooling design
166.
cost-effective design
167.
cost-oriented design
168.
course design
169.
courses on electronic testing and design
170.
curriculum design
171.
cylindrical cell design
172.
database design
173.
design
174.
design activity
175.
Design and assessment methods
176.
design and implementation of Performance Management Systems
177.
design and test
178.
design aspects
179.
design automation
180.
design cognition
181.
design collaboration
182.
design day
183.
design development
184.
design dimensions
185.
design domains
186.
design education
187.
design entrepreneurship
188.
design error localization
189.
design errors
190.
design evaluation
191.
design experiments
192.
design exploration
193.
design fiction
194.
design field testing
195.
design flaw
196.
design for disassembly
197.
design for experiments
198.
design for health
199.
design for manufacturability
200.
design for manufacture
201.
design for quality
202.
design for safety
203.
design for testability
204.
design function
205.
design globally-produce locally
206.
design impact
207.
design inefficiencies
208.
design language
209.
design management
210.
design management concept
211.
design management problems
212.
design management training
213.
design measuring
214.
Design method
215.
design methodology
216.
design methods
217.
design model
218.
design modularisation
219.
design modularity
220.
design obfuscation
221.
design of experiments
222.
Design of glass canopy
223.
design optimization
224.
design outdoor conditions
225.
design outdoor temperature
226.
design patterns
227.
design principles of FMS
228.
design process
229.
design quality
230.
design rhetoric
231.
design science
232.
design science research
233.
design skills
234.
design smell
235.
design space
236.
design space exploration
237.
design standards
238.
design structure matrix
239.
design structure matrix technology
240.
design support systems
241.
design system
242.
design tactics
243.
design theory
244.
design thinking
245.
design tools
246.
design understanding
247.
design value
248.
design worlds
249.
design, technologies and economics competencies
250.
Design-by-Contract
251.
design-driven business model
252.
design-driven innovation
253.
design-driven innovations
254.
design-for-test
255.
design-for-testability
256.
design-science
257.
DHW Design Flow Rate
258.
Die design
259.
digital design course
260.
digital design education
261.
digital FIR filter design
262.
digital integrated circuit (IC) design
263.
Digital test and testable design
264.
drug design
265.
dual stator design
266.
duct design
267.
early design
268.
early design digital tools
269.
early design phases
270.
early design stages
271.
educational design
272.
electrical machine design
273.
electronic design automation
274.
emerging design practices
275.
Energy Efficiency Design Index (EEDI)
276.
engineering design
277.
envelope design
278.
environmental design
279.
escape room design
280.
evolutive design process
281.
experimental design
282.
facade design
283.
fairway design
284.
fast boat design
285.
fault tolerant router design
286.
fire design
287.
fire design model
288.
fire safety design
289.
FPGA/PSoC design
290.
frequency sampling filter design
291.
generative design
292.
hardware design
293.
hardware/software co-design
294.
health promoting urban planning and design
295.
high-speed design
296.
human-centered design
297.
human-centric design
298.
Hydraulic design
299.
IC Design
300.
immersive design
301.
industrial design
302.
initial planning or design stage
303.
institutional design
304.
institutional quality and design
305.
integrated circuit design
306.
integrated design
307.
integrated design environment
308.
interaction design pattern
309.
inverse design
310.
iterative design
311.
iterative modelling and control design
312.
job design
313.
KMS design
314.
knowledge-based design
315.
landscape design
316.
lean design
317.
lean design management
318.
learning design
319.
legal design
320.
legal design standards
321.
logic design
322.
logistics curriculum design
323.
low-power ASIC design
324.
machine design
325.
market design
326.
materials design
327.
mechanical engineering design
328.
mechanism design
329.
mechanism design theory
330.
mixed-signal design
331.
mixed-use design
332.
model-driven design
333.
molecular design
334.
monitoring and application design
335.
multi-criteria design
336.
multidimensional design
337.
multi-layered curriculum design
338.
multi-pole model design
339.
nanoelectronic systems design
340.
nano-electronic systems design
341.
object-oriented design
342.
observer design
343.
online design error debug
344.
open design
345.
optimal design
346.
optimal-design
347.
optimization of the mechanical design
348.
package design solution
349.
parallel design and test
350.
parametric design
351.
parametric generative design
352.
participatory design
353.
passive design
354.
passive design strategies
355.
passive design strategy
356.
pavement design
357.
pedagogical design model
358.
performance-based design
359.
performance-driven design
360.
performance-driven urban design
361.
physical design
362.
PMS design
363.
policy design
364.
positive energy districts design
365.
power converters design
366.
principle of orthogonal design
367.
privacy by design
368.
proto-theory of design
369.
quality-by-design
370.
Regenerative Design
371.
remote design
372.
research design
373.
resilient urban design
374.
robot design
375.
robust design optimization
376.
safe-by-design
377.
sampling design
378.
satellite design
379.
school design
380.
secure ASIC Design
381.
service and product design
382.
service design
383.
service design (SD)
384.
shelter design evaluation
385.
shift-adds design
386.
signal design
387.
simulations-driven design
388.
size-specific implant design
389.
slotless design
390.
social design
391.
sociotechnical design
392.
soft robot materials and design
393.
software design
394.
solar design
395.
stormwater-resilient urban design
396.
structural fire design
397.
structure of design space
398.
sustainable design
399.
synchronic design process
400.
system analysis and design
401.
system design
402.
target value design
403.
teaching design and test of systems
404.
technical design
405.
technological design
406.
test model design
407.
textile-design
408.
thermal design
409.
timber fire design
410.
time-domain design
411.
touch-free system design
412.
trademark and design law
413.
transaction design
414.
transactional design
415.
universal design
416.
uplink control channel design
417.
urban design
418.
urban design research
419.
urban planning and design
420.
user interface and experience design
421.
user interface design
422.
user-centred design
423.
user-centred design (UCD)
424.
user-driven design processes
425.
value centric design
426.
value-based design
427.
value-centric design
428.
ventilation design
429.
virtual design and construction
430.
visualization design and evaluation methods
431.
work-holder design
432.
workplace design
433.
voxel-design approach
434.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
435.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
4
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
Ignis Fire Design Consulting
4.
Legal Design Summit
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT