Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security risk assessment (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/340)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
336
1.
security risk assessment
2.
security risk management
3.
Cardiovascular risk assessment
4.
ecological risk assessment
5.
environmental risk assessment
6.
machinery risk assessment
7.
military environment risk assessment
8.
models for risk assessment
9.
risk assessment
10.
risk assessment chemicals in the air
11.
rrivacy risk assessment
12.
semi-quantitative risk assessment method
13.
accrual-based credit risk model
14.
at-risk-of-poverty rates
15.
bank risk-taking
16.
bank-risk taking
17.
bankruptcy risk
18.
cancer risk
19.
cardiovascular risk
20.
cardiovascular risk factors
21.
climatic risk
22.
coastal risk index
23.
conceptual framework for safety/risk analysis
24.
conditional value at risk (CVaR)
25.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
26.
credit risk
27.
credit risk determinants
28.
credit risk forecasting
29.
credit risk modelling
30.
cyber risk
31.
cyber risk management in shipping
32.
disaster risk reduction
33.
Economic risk
34.
elimination of risk
35.
enterprise risk management
36.
environmental risk
37.
ergonomic risk
38.
ESG risk
39.
farmer's risk criterion
40.
fish injury and mortality risk
41.
flood risk management
42.
health risk
43.
heart disease risk factors
44.
infection risk
45.
infection risk calculators
46.
infection risk tools
47.
infection risk-based ventilation
48.
insurance risk
49.
kardiovaskulaarne risk
50.
knowledge risk
51.
knowledge risk management
52.
knowledge risk management (KRM)
53.
knowledge risk management in banking
54.
knowledge risk management in construction
55.
knowledge risk management in SMEs
56.
Moisture risk mitigation
57.
mould growth risk
58.
mould risk
59.
multi-risk/multi-criteria
60.
navigation risk
61.
navigation risk management course
62.
operational knowledge risk
63.
overheating risk
64.
perceived risk
65.
policy risk
66.
Polygenic risk score
67.
portfolio risk hedging
68.
potential risk
69.
pre-symptomatic period risk control
70.
proactive risk management
71.
process risk
72.
project risk management
73.
psychosocial risk factors
74.
quantitative risk analysis
75.
reactive risk management
76.
residual cardiovascular risk
77.
risk
78.
risk group for mental disorders
79.
risk allocation
80.
risk analysis
81.
risk assessments
82.
risk attitudes
83.
risk behavior
84.
risk classification
85.
risk evaluation model
86.
risk evaluation model development
87.
risk event chain analyses
88.
risk factors
89.
risk governance
90.
risk interdependence
91.
risk levels
92.
risk management
93.
risk management culture
94.
risk management in public organizations
95.
risk management model
96.
risk mitigation
97.
risk modelling
98.
risk of failure
99.
risk of mould growth
100.
risk prediction
101.
risk preference analysis
102.
risk prevention
103.
risk reduction
104.
risk stratification
105.
risk transfer
106.
risk-adjusted performance
107.
risk-based laws
108.
risk-based management
109.
risk-taking
110.
risk-taking behavior
111.
ship collision risk
112.
situational risk awareness
113.
standalone risk
114.
supply chain risk
115.
supply chain risk management
116.
systemic risk
117.
tourists’ perceived travel risk
118.
value at risk
119.
vascular risk factors
120.
3D risk assesment
121.
ad-hoc sensor networks security
122.
Automatic Security Verification
123.
Blockchain security
124.
cache security
125.
communication system security
126.
comprehensive system of economic security
127.
computer security
128.
cooperative security dilemma
129.
cyber security
130.
cyber security education
131.
cyber security exercises
132.
cyber security monitoring
133.
cyber security strategies
134.
cyber-security
135.
data and information security
136.
data security
137.
development of security cameras
138.
digital security practices
139.
drinking water security
140.
economic security
141.
economic security of enterprise
142.
emotional security
143.
energy security
144.
energy security indicator
145.
Estonian information security standard
146.
graded security
147.
hardware security
148.
hardware security primitive
149.
high level of security
150.
Homeland security
151.
human security
152.
information security
153.
information security and privacy
154.
initial level of security
155.
internal security
156.
international security
157.
investment and innovation security
158.
IPv6 security
159.
IT security
160.
IT security management
161.
job security
162.
long-term security
163.
maritime cyber security
164.
maritime cyber security operations centers
165.
Maritime Security Operations Center (M-SOC)
166.
medium level of security
167.
metadata model for security measures
168.
Middle Eastern security
169.
Mobile security
170.
national cyber security strategy
171.
national security
172.
NATO. Science for Peace and Security Program
173.
network security
174.
network security monitoring
175.
OSCE (Organization for Security and Co-operation in Europe)
176.
passenger’s security
177.
policy-based routing security
178.
political and security cultures
179.
post-quantum security
180.
power system security
181.
quantitative security
182.
regional security
183.
RISC-V Security Verification
184.
Safety and Security in Sea Transportation
185.
safety and security testing
186.
security
187.
security adaptation
188.
security alert prioritization
189.
security analysis
190.
security and justice (AFSJ)
191.
Security and political science
192.
security and privacy
193.
security and privacy in smart grids
194.
Security Assertion Mining
195.
security closure
196.
Security Coverage
197.
security dataset
198.
security dilemma
199.
Security evaluation
200.
security evaluation instruments
201.
Security limitations
202.
security log analysis
203.
security management
204.
security model
205.
security monitoring
206.
security notion
207.
security objectives
208.
security of data
209.
security of supply
210.
security operation center
211.
security operations center
212.
security patterns
213.
security policy
214.
security problem definition
215.
security proof
216.
security protocols
217.
security requirements
218.
security requirements engineering
219.
security research
220.
security risks
221.
security science and technology
222.
security strategies
223.
security systems for military objects
224.
security testing
225.
security training
226.
security verification
227.
security-by-design
228.
social security planning
229.
societal security
230.
software security
231.
software security level
232.
software security subcharacteristics
233.
sufficient level of security
234.
system of economic security
235.
system security
236.
terrorism security
237.
transmission System Security
238.
voting privacy and security
239.
Accuracy Assessment
240.
assessment
241.
assessment and testing
242.
assessment category
243.
assessment error
244.
assessment method
245.
assessment methods
246.
assessment of calorific value and moisture content
247.
assessment of voltage unbalance emission
248.
assessment of voltage unbalance sources
249.
assessment schemes
250.
automated quality assessment
251.
bridge assessment
252.
building sustainability assessment
253.
clinical assessment
254.
coastal vulnerability assessment
255.
comparative assessment
256.
compliance assessment
257.
computer‐aided assessment
258.
condition assessment
259.
consistency assessment
260.
criticality assessment
261.
cumulative effects assessment
262.
cyber battle damage assessment
263.
cyber impact assessment
264.
Design and assessment methods
265.
dietary assessment
266.
DPSIR assessment framework
267.
early stage energy assessment
268.
early-stage lifecycle assessment integration
269.
E-assessment
270.
economic regulation assessment
271.
energy assessment
272.
entrepreneurial ecosystem assessment
273.
environmental assessment
274.
environmental impact assessment
275.
Environmental impact assessment (EIA)
276.
environmental performance assessment and simulation
277.
expert assessment
278.
failure consequence assessment
279.
fatigue assessment
280.
FIM + FAM (functional assessment measure)
281.
flow assessment methods
282.
gait assessment
283.
grounding damage assessment
284.
habitat assessment
285.
hazard assessment
286.
Image Quality Assessment
287.
impact assessment
288.
in-situ assessment
289.
integrated assessment
290.
intellectualization of assessment
291.
life cycle assessment
292.
life cycle assessment (LCA)
293.
life cycle sustainability assessment
294.
lifecycle assessment
295.
life-cycle assessment
296.
m-assessment
297.
material quality assessment
298.
multiple criteria assessment
299.
nutrition assessment
300.
oocyte assessment
301.
outcomes assessment
302.
performance assessment
303.
policy assessment
304.
probabilistic assessment
305.
quality assessment
306.
readiness assessment
307.
reliability assessment
308.
reliability assessment and enhancement
309.
remaining life assessment
310.
remaining lifetime assessment
311.
resilience assessment
312.
resiliency assessment
313.
resource assessment
314.
road safety impact assessment
315.
safety assessment tool
316.
Self assessment tool
317.
self-assessment
318.
self-assessment tool
319.
signal quality assessment
320.
skill assessment
321.
skills assessment
322.
skills assessment of programming and mathematics
323.
Social impact assessment
324.
spatial glare assessment
325.
strategic environmental assessment
326.
sustainability assessment
327.
sustainability assessment (DSS-HS)
328.
sustainability assessment method
329.
sustainable assessment tools
330.
techno-economic assessment
331.
thermodynamic assessment
332.
training needs assessment
333.
ultimate strength assessment
334.
wave energy resource assessment
335.
visual assessment
336.
vulnerability assessment
märksõna
4
1.
kardiovaskulaarne risk
2.
risk
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT