Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
quantitative security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/145)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
143
1.
quantitative security
2.
absolute quantitative proteomics
3.
current state capability quantitative estimates
4.
qualitative and quantitative analysis
5.
quantitative
6.
quantitative analysis
7.
quantitative and qualitative criteria
8.
quantitative association rule mining
9.
quantitative chemical analysis
10.
quantitative easing
11.
quantitative land cover reconstructions
12.
quantitative lignin determination
13.
quantitative logic
14.
quantitative metal analysis
15.
quantitative method
16.
quantitative methods
17.
quantitative past land cover
18.
quantitative proteomics
19.
quantitative risk analysis
20.
quantitative stratigraph
21.
quantitative stratigraphy
22.
quantitative study
23.
quantitative XRD analysis
24.
semi-quantitative risk assessment method
25.
ad-hoc sensor networks security
26.
Automatic Security Verification
27.
Blockchain security
28.
cache security
29.
communication system security
30.
comprehensive system of economic security
31.
computer security
32.
cooperative security dilemma
33.
cyber security
34.
cyber security education
35.
cyber security exercises
36.
cyber security monitoring
37.
cyber security strategies
38.
cyber-security
39.
data and information security
40.
data security
41.
development of security cameras
42.
digital security practices
43.
drinking water security
44.
economic security
45.
economic security of enterprise
46.
emotional security
47.
energy security
48.
energy security indicator
49.
Estonian information security standard
50.
graded security
51.
hardware security
52.
hardware security primitive
53.
high level of security
54.
Homeland security
55.
human security
56.
information security
57.
information security and privacy
58.
initial level of security
59.
internal security
60.
international security
61.
investment and innovation security
62.
IPv6 security
63.
IT security
64.
IT security management
65.
job security
66.
long-term security
67.
maritime cyber security
68.
maritime cyber security operations centers
69.
Maritime Security Operations Center (M-SOC)
70.
medium level of security
71.
metadata model for security measures
72.
Middle Eastern security
73.
Mobile security
74.
national cyber security strategy
75.
national security
76.
NATO. Science for Peace and Security Program
77.
network security
78.
network security monitoring
79.
OSCE (Organization for Security and Co-operation in Europe)
80.
passenger’s security
81.
policy-based routing security
82.
political and security cultures
83.
post-quantum security
84.
power system security
85.
regional security
86.
RISC-V Security Verification
87.
Safety and Security in Sea Transportation
88.
safety and security testing
89.
security
90.
security adaptation
91.
security alert prioritization
92.
security analysis
93.
security and justice (AFSJ)
94.
Security and political science
95.
security and privacy
96.
security and privacy in smart grids
97.
Security Assertion Mining
98.
security closure
99.
Security Coverage
100.
security dataset
101.
security dilemma
102.
Security evaluation
103.
security evaluation instruments
104.
Security limitations
105.
security log analysis
106.
security management
107.
security model
108.
security monitoring
109.
security notion
110.
security objectives
111.
security of data
112.
security of supply
113.
security operation center
114.
security operations center
115.
security patterns
116.
security policy
117.
security problem definition
118.
security proof
119.
security protocols
120.
security requirements
121.
security requirements engineering
122.
security research
123.
security risk assessment
124.
security risk management
125.
security risks
126.
security science and technology
127.
security strategies
128.
security systems for military objects
129.
security testing
130.
security training
131.
security verification
132.
security-by-design
133.
social security planning
134.
societal security
135.
software security
136.
software security level
137.
software security subcharacteristics
138.
sufficient level of security
139.
system of economic security
140.
system security
141.
terrorism security
142.
transmission System Security
143.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT