Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security risk assessment (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/263)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
259
1.
security risk assessment
2.
security risk management
3.
ecological risk assessment
4.
environmental risk assessment
5.
military environment risk assessment
6.
models for risk assessment
7.
risk assessment
8.
risk assessment chemicals in the air
9.
semi-quantitative risk assessment method
10.
at-risk-of-poverty rates
11.
bank risk-taking
12.
bank-risk taking
13.
bankruptcy risk
14.
cancer risk
15.
cardiovascular risk
16.
cardiovascular risk factors
17.
climatic risk
18.
coastal risk index
19.
conditional value at risk (CVaR)
20.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
21.
credit risk
22.
credit risk determinants
23.
cyber risk
24.
disaster risk reduction
25.
Economic risk
26.
elimination of risk
27.
environmental risk
28.
ESG risk
29.
farmer's risk criterion
30.
fish injury and mortality risk
31.
flood risk management
32.
health risk
33.
heart disease risk factors
34.
infection risk
35.
infection risk-based ventilation
36.
insurance risk
37.
kardiovaskulaarne risk
38.
knowledge risk
39.
knowledge risk management
40.
knowledge risk management (KRM)
41.
knowledge risk management in banking
42.
knowledge risk management in construction
43.
knowledge risk management in SMEs
44.
mould growth risk
45.
mould risk
46.
multi-risk/multi-criteria
47.
operational knowledge risk
48.
overheating risk
49.
perceived risk
50.
Polygenic risk score
51.
portfolio risk hedging
52.
potential risk
53.
pre-symptomatic period risk control
54.
proactive risk management
55.
process risk
56.
project risk management
57.
psychosocial risk factors
58.
quantitative risk analysis
59.
reactive risk management
60.
residual cardiovascular risk
61.
risk
62.
risk group for mental disorders
63.
risk allocation
64.
risk analysis
65.
risk assessments
66.
risk attitudes
67.
risk behavior
68.
risk classification
69.
risk evaluation model
70.
risk evaluation model development
71.
risk factors
72.
risk governance
73.
risk interdependence
74.
risk levels
75.
risk management
76.
risk management culture
77.
risk management in public organizations
78.
risk management model
79.
risk mitigation
80.
risk modelling
81.
risk of failure
82.
risk of mould growth
83.
risk prediction
84.
risk preference analysis
85.
risk prevention
86.
risk stratification
87.
risk transfer
88.
risk-adjusted performance
89.
risk-taking
90.
situational risk awareness
91.
standalone risk
92.
supply chain risk
93.
supply chain risk management
94.
systemic risk
95.
value at risk
96.
vascular risk factors
97.
3D risk assesment
98.
ad-hoc sensor networks security
99.
Blockchain security
100.
cache security
101.
communication system security
102.
comprehensive system of economic security
103.
computer security
104.
cooperative security dilemma
105.
cyber security
106.
cyber security education
107.
cyber security exercises
108.
cyber security strategies
109.
cyber-security
110.
data security
111.
development of security cameras
112.
drinking water security
113.
economic security
114.
economic security of enterprise
115.
emotional security
116.
energy security
117.
energy security indicator
118.
graded security
119.
hardware security
120.
hardware security primitive
121.
human security
122.
information security
123.
internal security
124.
international security
125.
investment and innovation security
126.
IPv6 security
127.
IT security
128.
job security
129.
long-term security
130.
metadata model for security measures
131.
Middle Eastern security
132.
Mobile security
133.
national cyber security strategy
134.
national security
135.
NATO. Science for Peace and Security Program
136.
network security
137.
network security monitoring
138.
OSCE (Organization for Security and Co-operation in Europe)
139.
passenger’s security
140.
policy-based routing security
141.
political and security cultures
142.
post-quantum security
143.
power system security
144.
quantitative security
145.
regional security
146.
security
147.
security and privacy
148.
security and privacy in smart grids
149.
security closure
150.
Security Coverage
151.
security dataset
152.
security dilemma
153.
Security evaluation
154.
security log analysis
155.
security management
156.
security model
157.
security monitoring
158.
security notion
159.
security objectives
160.
security of data
161.
security of supply
162.
security operation center
163.
security patterns
164.
security problem definition
165.
security proof
166.
security protocols
167.
security requirements
168.
security requirements engineering
169.
security strategies
170.
security systems for military objects
171.
security testing
172.
security training
173.
security verification
174.
social security planning
175.
societal security
176.
system of economic security
177.
system security
178.
terrorism security
179.
transmission System Security
180.
voting privacy and security
181.
Accuracy Assessment
182.
assessment
183.
assessment category
184.
assessment error
185.
assessment methods
186.
assessment of calorific value and moisture content
187.
assessment of voltage unbalance emission
188.
assessment of voltage unbalance sources
189.
assessment schemes
190.
automated quality assessment
191.
bridge assessment
192.
building sustainability assessment
193.
clinical assessment
194.
coastal vulnerability assessment
195.
comparative assessment
196.
compliance assessment
197.
computer‐aided assessment
198.
condition assessment
199.
criticality assessment
200.
cumulative effects assessment
201.
cyber battle damage assessment
202.
cyber impact assessment
203.
DPSIR assessment framework
204.
early stage energy assessment
205.
economic regulation assessment
206.
energy assessment
207.
entrepreneurial ecosystem assessment
208.
environmental assessment
209.
environmental impact assessment
210.
Environmental impact assessment (EIA)
211.
environmental performance assessment and simulation
212.
failure consequence assessment
213.
fatigue assessment
214.
FIM + FAM (functional assessment measure)
215.
flow assessment methods
216.
gait assessment
217.
grounding damage assessment
218.
habitat assessment
219.
impact assessment
220.
in-situ assessment
221.
integrated assessment
222.
intellectualization of assessment
223.
life cycle assessment
224.
life cycle assessment (LCA)
225.
life cycle sustainability assessment
226.
lifecycle assessment
227.
life-cycle assessment
228.
m-assessment
229.
multiple criteria assessment
230.
nutrition assessment
231.
oocyte assessment
232.
outcomes assessment
233.
performance assessment
234.
policy assessment
235.
probabilistic assessment
236.
quality assessment
237.
remaining life assessment
238.
remaining lifetime assessment
239.
resiliency assessment
240.
resource assessment
241.
road safety impact assessment
242.
safety assessment tool
243.
Self assessment tool
244.
self-assessment
245.
self-assessment tool
246.
signal quality assessment
247.
skill assessment
248.
skills assessment
249.
Social impact assessment
250.
spatial glare assessment
251.
strategic environmental assessment
252.
sustainability assessment
253.
sustainability assessment (DSS-HS)
254.
sustainability assessment method
255.
sustainable assessment tools
256.
thermodynamic assessment
257.
training needs assessment
258.
visual assessment
259.
vulnerability assessment
märksõna
4
1.
kardiovaskulaarne risk
2.
risk
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT