Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security analysis (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/598)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Adaptive and efficient federated distillation with selective homomorphic encryption for edge AI
Rahbari, Dadmehr
;
Daneshtalab, Masoud
;
Jenihhin, Maksim
Expert Systems with Applications
2026
/
art. 131002
https://doi.org/10.1016/j.eswa.2025.131002
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Threat modeling of industrial control systems: A systematic literature review
Khalil, Shaymaa Mamdouh
;
Bahsi, Hayretdin
;
Korõtko, Tarmo
Computers and security
2024
/
art. 103543, 19 p. : ill
https://doi.org/10.1016/j.cose.2023.103543
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
596
1.
security analysis
2.
security log analysis
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security monitoring in maritime
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
data and information security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
economic security
26.
economic security of enterprise
27.
emotional security
28.
energy security
29.
energy security indicator
30.
Estonian information security standard
31.
graded security
32.
hardware security
33.
hardware security primitive
34.
high level of security
35.
Homeland security
36.
human security
37.
information security
38.
information security and privacy
39.
initial level of security
40.
internal security
41.
international security
42.
investment and innovation security
43.
IPv6 security
44.
IT security
45.
IT security management
46.
job security
47.
long-term security
48.
maritime cyber security
49.
maritime cyber security operations centers
50.
Maritime Security Operations Center (M-SOC)
51.
medium level of security
52.
metadata model for security measures
53.
Middle Eastern security
54.
Mobile security
55.
national cyber security strategy
56.
national security
57.
NATO. Science for Peace and Security Program
58.
network security
59.
network security monitoring
60.
OSCE (Organization for Security and Co-operation in Europe)
61.
passenger’s security
62.
policy-based routing security
63.
political and security cultures
64.
post-quantum security
65.
power system security
66.
quantitative security
67.
regional security
68.
RISC-V Security Verification
69.
safety and security in sea transportation
70.
safety and security testing
71.
security
72.
security adaptation
73.
security alert prioritization
74.
security and justice (AFSJ)
75.
Security and political science
76.
security and privacy
77.
security and privacy in smart grids
78.
Security Assertion
79.
Security Assertion Mining
80.
security closure
81.
Security Coverage
82.
security dataset
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems
111.
security systems for military objects
112.
security testing
113.
security training
114.
security verification
115.
security-by-design
116.
social security planning
117.
societal security
118.
software security
119.
software security level
120.
software security subcharacteristics
121.
sufficient level of security
122.
system of economic security
123.
system security
124.
terrorism security
125.
transmission System Security
126.
voting privacy and security
127.
ABC analysis
128.
AC analysis
129.
accident analysis
130.
accuracy analysis
131.
acoustic analysis
132.
acoustic signal analysis
133.
activation analysis
134.
algebraic analysis
135.
amino acids analysis
136.
analysis
137.
analysis costs
138.
analysis methods
139.
analysis model
140.
analysis patterns
141.
analysis software
142.
analysis structuring
143.
analytical analysis
144.
analytical flow network analysis
145.
application analysis
146.
asymptotic analysis
147.
audio signal analysis
148.
autocorrelation analysis
149.
bandwidth analysis
150.
banking analysis
151.
barrier analysis
152.
benchmark analysis
153.
bibliometric analysis
154.
big data analysis
155.
big graph analysis
156.
Biochemical analysis
157.
bioelectrical impedance analysis
158.
bioinformatic analysis
159.
biomass composition analysis
160.
Bland-Altman analysis
161.
break-even analysis
162.
Buckling analysis
163.
business analysis
164.
business process analysis
165.
C. Numerical analysis
166.
cache vulnerability analysis
167.
calculation analysis
168.
carbon footprint analysis
169.
case analysis methodology
170.
cash flow analysis
171.
cash-based analysis
172.
Choice-Based Conjoint analysis
173.
circuit analysis
174.
citation analysis
175.
climate analysis
176.
cluster analysis
177.
clustering analysis
178.
CO2 concentration analysis
179.
co-citation analysis
180.
comparative analysis
181.
competition analysis
182.
component dependency analysis
183.
Computational Fluid Dynamics (CFD) analysis
184.
conceptual framework for safety/risk analysis
185.
conformational analysis
186.
content analysis
187.
control system analysis
188.
Convergence analysis
189.
correlation analysis
190.
Cost & benefit analysis
191.
cost analysis
192.
cost benefit analysis
193.
cost efficiency analysis
194.
cost-benefit analysis
195.
cost-effectiveness analysis
196.
costing analysis cataloging processes
197.
country analysis model
198.
coupled and decoupled analysis
199.
co-word analysis
200.
critical disclosure analysis
201.
critical discourse analysis
202.
cross-lagged analysis
203.
cross-language analysis
204.
cryoelectron microscopy single-particle analysis
205.
curricula content analysis
206.
dairy product analysis
207.
data analysis
208.
data envelopment analysis
209.
defect and failure analysis
210.
dependency analysis
211.
descriptive sensory analysis
212.
determinacy analysis
213.
detrended fluctuation analysis (DFA)
214.
deviation analysis
215.
DFM analysis
216.
Differential Power Analysis (DPA)
217.
differential thermal analysis (DTA)
218.
digital image analysis
219.
discourse analysis
220.
discrete analysis
221.
discrete spectral analysis
222.
discriminant analysis
223.
dispersion analysis
224.
dissipation analysis
225.
domain analysis
226.
domain analysis and engineering
227.
donor behavior analysis
228.
droplet analysis
229.
droplet digital image analysis
230.
DuPont analysis
231.
dynamic analysis
232.
dynamic handwriting analysis
233.
EBSD analysis
234.
econometric analysis
235.
economic analysis
236.
economic feasibility analysis
237.
Economic growth and aggregate productivity regional government analysis
238.
EEG analysis
239.
efficiency analysis
240.
efficiency map analysis
241.
Eigenvalue analysis
242.
electric machine analysis computing
243.
electric network analysis
244.
electromagnetic analysis
245.
electron backscattered diffraction analysis
246.
elemental analysis
247.
ELF Binary Analysis
248.
empirical analysis
249.
energy system analysis
250.
Enrichment analysis
251.
enterprise analysis model (EAM)
252.
enterprise data analysis
253.
environmental analysis
254.
EOF analysis
255.
epistemological analysis
256.
error analysis
257.
event log analysis
258.
evolved gas analysis
259.
Evolved gas analysis (EGA)
260.
ex post analysis
261.
experimental analysis
262.
experimental modal analysis
263.
explicit analysis
264.
exploratory analysis
265.
exploratory data analysis
266.
extreme value analysis
267.
factor analysis
268.
failure analysis
269.
Failure mode and effect analysis (FMEA)
270.
failure modes and effect analysis
271.
fast independent component analysis
272.
fault analysis
273.
fault analysis model
274.
fault tree analysis
275.
FE analysis
276.
FEA analysis
277.
feasibility analysis
278.
feature analysis
279.
FEM analysis
280.
financial statement analysis
281.
fingerprint analysis
282.
finite element (FE) analysis
283.
finite element analysis
284.
finite element analysis (FEA)
285.
finite element analysis benchmarking
286.
finite-element (FE) analysis
287.
finite-element analysis
288.
flow analysis
289.
flow network analysis
290.
Flux balance analysis
291.
flux balance analysis biotechnological processes
292.
food analysis
293.
forensic analysis
294.
forensic soil analysis
295.
formal concept analysis
296.
Fourier analysis
297.
fractal analysis
298.
framing analysis
299.
free vibration analysis
300.
frequency analysis
301.
frequency domain analysis
302.
frequency response analysis
303.
frequency transform analysis
304.
frequency-domain analysis
305.
functional data analysis
306.
functional gene analysis
307.
functional institutional analysis
308.
fuzzy set qualitative comparative analysis (fsQCA)
309.
Fuzzy-Set Qualitative comparative analysis
310.
gait analysis
311.
gap analysis
312.
gate-level analysis
313.
GC/MS analysis
314.
genome-wide analysis
315.
geospatial analysis
316.
girder analysis
317.
GIS analysis
318.
grading analysis
319.
grain-size analysis
320.
grounding damage analysis
321.
harmonic analysis
322.
hierarchical cluster analysis (statistics)
323.
hierarchical timing analysis
324.
hierarchical two-level analysis
325.
high-speed thermogravimetric analysis
326.
high-temperature differential thermal analysis (HDTA)
327.
high-throughput analysis
328.
human motion analysis
329.
identity structure analysis
330.
Identity Structure Analysis (ISA)
331.
image analysis
332.
impact analysis
333.
index number analysis
334.
inductive qualitative content analysis
335.
information analysis
336.
innovative support analysis
337.
input-output analysis
338.
institutional analysis
339.
integrated system of performance analysis
340.
international comparative analysis
341.
intsitutional analysis
342.
investment analysis
343.
investment impact analysis
344.
isogeometric analysis
345.
kinetic analysis
346.
Lagrangian analysis
347.
landscape analysis
348.
learning analysis
349.
life cycle analysis
350.
life cycle analysis (LCA)
351.
life cycle cost analysis (LCCA)
352.
life-cycle cost analysis
353.
lifetime analysis
354.
linguistic analysis
355.
link analysis
356.
literature analysis
357.
lithofacies analysis
358.
load-bearing analysis
359.
log file analysis
360.
logical analysis
361.
logico-phaneroscopical analysis
362.
long-term performance analysis
363.
Lyapunov analysis
364.
machinery utilization analysis
365.
macroeconomic analysis
366.
macrofossil analysis
367.
MALDI-TOF mass spectrometry analysis
368.
malware analysis
369.
map analysis
370.
market analysis
371.
market basket analysis
372.
mass analysis
373.
Material flow analysis
374.
materials computational analysis
375.
mathematical analysis
376.
matrix analysis
377.
mediation analysis
378.
melissopalynological analysis
379.
meta-analysis
380.
metabolic control analysis
381.
metabolic flux analysis
382.
metabolic pathways analysis
383.
metagenetic analysis
384.
metagenome analysis
385.
Metagenomic analysis
386.
metallographic analysis
387.
metaphors in analysis
388.
meta-regression analysis
389.
method of analysis
390.
method of signature analysis of outgoing traffic
391.
methods: data analysis
392.
MICMAC analysis
393.
microarray analysis
394.
microfacies analysis
395.
microscope analysis
396.
microscopy image analysis
397.
microstructural analysis
398.
milk analysis
399.
mixing analysis
400.
modal analysis
401.
Module Analysis
402.
Monetary policy analysis
403.
Monte Carlo analysis
404.
morphotectonic analysis
405.
motion analysis
406.
motor current signature analysis
407.
multi scale analysis
408.
multi-country analysis
409.
multicriteria analysis
410.
multi-criteria analysis
411.
Multi-criteria decision analysis
412.
multi-criteria-analysis
413.
multifractal analysis
414.
multiphysics analysis
415.
Multiple criteria analysis
416.
multiple factorial analysis
417.
multivariate analysis
418.
multivariate data analysis
419.
mutation analysis
420.
network analysis
421.
noise analysis
422.
non-Archimedean analysis
423.
non-commutative complex analysis
424.
nonlinear analysis
425.
numerical analysis
426.
organic residue analysis
427.
package test analysis
428.
paper micro-zone analysis
429.
parametric multi-impact analysis
430.
Pareto front analysis
431.
particle size analysis
432.
PCA analysis
433.
peptide analysis
434.
performance analysis
435.
performance analysis reconfigurable architectures
436.
PESTEL analysis
437.
phenotypic analysis
438.
phylogenetic analysis
439.
plant macrofossil analysis
440.
pollen analysis
441.
popularity analysis
442.
post-analysis of rules
443.
power mismatch analysis
444.
power system analysis computing
445.
predictive analysis
446.
principal component analysis
447.
principal component analysis (PCA)
448.
probabilistic analysis
449.
profitability analysis
450.
program analysis
451.
proximity analysis
452.
pulse analysis
453.
Pulse shape analysis
454.
pulse wave analysis
455.
pulse waveform analysis
456.
qualitative analysis
457.
qualitative and quantitative analysis
458.
qualitative comparison analysis
459.
qualitative network analysis
460.
quantitative analysis
461.
quantitative chemical analysis
462.
quantitative metal analysis
463.
quantitative risk analysis
464.
quantitative XRD analysis
465.
quasi steady state (QSS) analysis
466.
quasi-static analysis
467.
Raman analysis
468.
ramp behavior analysis
469.
ramping behaviour analysis
470.
ratio analysis
471.
Real-time Analysis
472.
real-time vibration analysis
473.
regression analysis
474.
Regression tree analysis
475.
reliability analysis
476.
risk analysis
477.
risk preference analysis
478.
robot-cell performance analysis
479.
robust stability analysis
480.
robustness analysis
481.
RTL analysis
482.
safety risk analysis
483.
scenario analysis
484.
seasonal analysis
485.
self-analysis
486.
SEM analysis
487.
SEM-analysis
488.
sensitivity analysis
489.
Sensors modeling and analysis
490.
sensory analysis
491.
sentiment analysis
492.
sequence analysis
493.
signal analysis
494.
similarity analysis
495.
simulation analysis
496.
simulation and analysis
497.
Simultaneous thermogravimetry (TG) and differential thermal analysis (DTA)
498.
single crystal analysis
499.
singular spectrum analysis (SSA)
500.
situational analysis
501.
sobol sensitivity analysis
502.
social network analysis
503.
social-economic analysis
504.
sociotechnical analysis
505.
spatial analysis
506.
spatial data analysis
507.
spatio-temporal analysis
508.
spectral analysis
509.
spectrogram analysis
510.
Spectrophotometric analysis
511.
spectrum analysis
512.
spore and pollen analysis
513.
stability analysis
514.
stable isotope analysis
515.
stakeholder analysis
516.
static analysis
517.
static timing analysis
518.
statistical analysis
519.
steady state analysis
520.
steady-state analysis
521.
steady‐state growth space analysis
522.
stedy-state analysis
523.
strength analysis
524.
string analysis
525.
structural analysis
526.
structural decomposition analysis
527.
structure computer analysis
528.
student data analysis
529.
suitability analysis
530.
surface wave analysis
531.
survival analysis
532.
sweat analysis
533.
SWOT analysis
534.
symbolic data analysis
535.
symmetry analysis
536.
synchronous reluctance motors thermal analysis
537.
system analysis
538.
system analysis and design
539.
system integrated analysis
540.
system-level analysis
541.
systems integrated analysis
542.
systems-theoretic process analysis (STPA)
543.
task analysis
544.
taste dilution analysis
545.
technical analysis
546.
technoeconomic analysis
547.
Techno-economic analysis
548.
technology analysis
549.
TEM and SEM analysis
550.
TEM-analysis
551.
term-frequency analysis
552.
testability analysis
553.
texture profile analysis
554.
the accuracy of monitoring in analysis of impact impulses
555.
thematic analysis
556.
thematic content analysis
557.
theoretical analysis
558.
thermal analysis
559.
thermal analysis tool
560.
thermodynamic analysis
561.
thermoeconomic analysis
562.
thermogravimetric analysis
563.
time analysis
564.
time domain analysis
565.
time series analysis
566.
timing analysis
567.
tolerance analysis
568.
topographic analysis
569.
training needs analysis
570.
Transdermal analysis patch
571.
transformer analysis
572.
transient analysis
573.
trend analysis
574.
uncertainty analysis
575.
urban analysis
576.
user click behaviour analysis
577.
value network analysis
578.
water analysis
579.
waveform analysis
580.
wavelet analysis
581.
weak signal analysis
582.
wear analysis
583.
western blot analysis
584.
vibrational analysis
585.
wind analysis
586.
visco-thermal analysis
587.
visits registration and statistical analysis
588.
work analysis
589.
X-ray analysis
590.
X-ray crystallographic analysis
591.
X-ray line-profile analysis
592.
XRD structure analysis
593.
XYZ analysis
594.
(computational fluid dynamics) CFD analysis
595.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
596.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT