Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security analysis (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/590)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Adaptive and efficient federated distillation with selective homomorphic encryption for edge AI
Rahbari, Dadmehr
;
Daneshtalab, Masoud
;
Jenihhin, Maksim
Expert Systems with Applications
2026
/
art. 131002
https://doi.org/10.1016/j.eswa.2025.131002
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
Threat modeling of industrial control systems: A systematic literature review
Khalil, Shaymaa Mamdouh
;
Bahsi, Hayretdin
;
Korõtko, Tarmo
Computers and security
2024
/
art. 103543, 19 p. : ill
https://doi.org/10.1016/j.cose.2023.103543
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
588
1.
security analysis
2.
security log analysis
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
cloud security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-physical system security
18.
cyber-security
19.
data and information security
20.
data security
21.
development of security cameras
22.
digital security practices
23.
drinking water security
24.
economic security
25.
economic security of enterprise
26.
emotional security
27.
energy security
28.
energy security indicator
29.
Estonian information security standard
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
information security
37.
information security and privacy
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
metadata model for security measures
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
network security
58.
network security monitoring
59.
OSCE (Organization for Security and Co-operation in Europe)
60.
passenger’s security
61.
policy-based routing security
62.
political and security cultures
63.
post-quantum security
64.
power system security
65.
quantitative security
66.
regional security
67.
RISC-V Security Verification
68.
Safety and Security in Sea Transportation
69.
safety and security testing
70.
security
71.
security adaptation
72.
security alert prioritization
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security management
88.
security model
89.
security monitoring
90.
security notion
91.
security objectives
92.
security of data
93.
security of supply
94.
security operation center
95.
security operations center
96.
security patterns
97.
security policy
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security research
104.
security risk assessment
105.
security risk management
106.
security risks
107.
security science and technology
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
security-by-design
114.
social security planning
115.
societal security
116.
software security
117.
software security level
118.
software security subcharacteristics
119.
sufficient level of security
120.
system of economic security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
ABC analysis
126.
AC analysis
127.
accident analysis
128.
accuracy analysis
129.
acoustic analysis
130.
acoustic signal analysis
131.
activation analysis
132.
algebraic analysis
133.
amino acids analysis
134.
analysis
135.
analysis costs
136.
analysis methods
137.
analysis model
138.
analysis patterns
139.
analysis software
140.
analysis structuring
141.
analytical analysis
142.
analytical flow network analysis
143.
application analysis
144.
asymptotic analysis
145.
audio signal analysis
146.
autocorrelation analysis
147.
bandwidth analysis
148.
banking analysis
149.
barrier analysis
150.
benchmark analysis
151.
bibliometric analysis
152.
big data analysis
153.
big graph analysis
154.
Biochemical analysis
155.
bioelectrical impedance analysis
156.
bioinformatic analysis
157.
biomass composition analysis
158.
Bland-Altman analysis
159.
break-even analysis
160.
Buckling analysis
161.
business analysis
162.
business process analysis
163.
C. Numerical analysis
164.
cache vulnerability analysis
165.
calculation analysis
166.
case analysis methodology
167.
cash flow analysis
168.
cash-based analysis
169.
Choice-Based Conjoint analysis
170.
circuit analysis
171.
citation analysis
172.
climate analysis
173.
cluster analysis
174.
clustering analysis
175.
CO2 concentration analysis
176.
co-citation analysis
177.
comparative analysis
178.
competition analysis
179.
component dependency analysis
180.
Computational Fluid Dynamics (CFD) analysis
181.
conceptual framework for safety/risk analysis
182.
conformational analysis
183.
content analysis
184.
control system analysis
185.
Convergence analysis
186.
correlation analysis
187.
Cost & benefit analysis
188.
cost analysis
189.
cost benefit analysis
190.
cost efficiency analysis
191.
cost-benefit analysis
192.
cost-effectiveness analysis
193.
costing analysis cataloging processes
194.
country analysis model
195.
coupled and decoupled analysis
196.
co-word analysis
197.
critical disclosure analysis
198.
critical discourse analysis
199.
cross-lagged analysis
200.
cross-language analysis
201.
cryoelectron microscopy single-particle analysis
202.
curricula content analysis
203.
dairy product analysis
204.
data analysis
205.
data envelopment analysis
206.
defect and failure analysis
207.
dependency analysis
208.
descriptive sensory analysis
209.
determinacy analysis
210.
detrended fluctuation analysis (DFA)
211.
deviation analysis
212.
DFM analysis
213.
Differential Power Analysis (DPA)
214.
differential thermal analysis (DTA)
215.
digital image analysis
216.
discrete analysis
217.
discrete spectral analysis
218.
discriminant analysis
219.
dispersion analysis
220.
dissipation analysis
221.
domain analysis
222.
domain analysis and engineering
223.
donor behavior analysis
224.
droplet analysis
225.
droplet digital image analysis
226.
DuPont analysis
227.
dynamic analysis
228.
dynamic handwriting analysis
229.
EBSD analysis
230.
econometric analysis
231.
economic analysis
232.
economic feasibility analysis
233.
Economic growth and aggregate productivity regional government analysis
234.
EEG analysis
235.
efficiency analysis
236.
efficiency map analysis
237.
Eigenvalue analysis
238.
electric machine analysis computing
239.
electric network analysis
240.
electromagnetic analysis
241.
electron backscattered diffraction analysis
242.
elemental analysis
243.
ELF Binary Analysis
244.
empirical analysis
245.
energy system analysis
246.
Enrichment analysis
247.
enterprise analysis model (EAM)
248.
enterprise data analysis
249.
environmental analysis
250.
EOF analysis
251.
epistemological analysis
252.
error analysis
253.
event log analysis
254.
evolved gas analysis
255.
Evolved gas analysis (EGA)
256.
ex post analysis
257.
experimental analysis
258.
experimental modal analysis
259.
explicit analysis
260.
exploratory analysis
261.
exploratory data analysis
262.
extreme value analysis
263.
factor analysis
264.
failure analysis
265.
Failure mode and effect analysis (FMEA)
266.
failure modes and effect analysis
267.
fast independent component analysis
268.
fault analysis
269.
fault analysis model
270.
fault tree analysis
271.
FE analysis
272.
FEA analysis
273.
feasibility analysis
274.
feature analysis
275.
FEM analysis
276.
financial statement analysis
277.
fingerprint analysis
278.
finite element (FE) analysis
279.
finite element analysis
280.
finite element analysis (FEA)
281.
finite element analysis benchmarking
282.
finite-element (FE) analysis
283.
finite-element analysis
284.
flow analysis
285.
flow network analysis
286.
Flux balance analysis
287.
flux balance analysis biotechnological processes
288.
food analysis
289.
forensic analysis
290.
forensic soil analysis
291.
formal concept analysis
292.
Fourier analysis
293.
fractal analysis
294.
framing analysis
295.
free vibration analysis
296.
frequency analysis
297.
frequency domain analysis
298.
frequency response analysis
299.
frequency transform analysis
300.
frequency-domain analysis
301.
functional data analysis
302.
functional gene analysis
303.
functional institutional analysis
304.
fuzzy set qualitative comparative analysis (fsQCA)
305.
Fuzzy-Set Qualitative comparative analysis
306.
gait analysis
307.
gap analysis
308.
gate-level analysis
309.
GC/MS analysis
310.
genome-wide analysis
311.
geospatial analysis
312.
girder analysis
313.
GIS analysis
314.
grading analysis
315.
grain-size analysis
316.
grounding damage analysis
317.
harmonic analysis
318.
hierarchical cluster analysis (statistics)
319.
hierarchical timing analysis
320.
hierarchical two-level analysis
321.
high-speed thermogravimetric analysis
322.
high-temperature differential thermal analysis (HDTA)
323.
high-throughput analysis
324.
human motion analysis
325.
identity structure analysis
326.
Identity Structure Analysis (ISA)
327.
image analysis
328.
impact analysis
329.
index number analysis
330.
inductive qualitative content analysis
331.
information analysis
332.
innovative support analysis
333.
input-output analysis
334.
institutional analysis
335.
integrated system of performance analysis
336.
international comparative analysis
337.
intsitutional analysis
338.
investment analysis
339.
investment impact analysis
340.
isogeometric analysis
341.
kinetic analysis
342.
Lagrangian analysis
343.
landscape analysis
344.
learning analysis
345.
life cycle analysis
346.
life cycle analysis (LCA)
347.
life cycle cost analysis (LCCA)
348.
life-cycle cost analysis
349.
lifetime analysis
350.
linguistic analysis
351.
link analysis
352.
literature analysis
353.
lithofacies analysis
354.
load-bearing analysis
355.
log file analysis
356.
logical analysis
357.
logico-phaneroscopical analysis
358.
long-term performance analysis
359.
Lyapunov analysis
360.
machinery utilization analysis
361.
macroeconomic analysis
362.
macrofossil analysis
363.
MALDI-TOF mass spectrometry analysis
364.
malware analysis
365.
map analysis
366.
market analysis
367.
market basket analysis
368.
mass analysis
369.
Material flow analysis
370.
materials computational analysis
371.
mathematical analysis
372.
matrix analysis
373.
mediation analysis
374.
melissopalynological analysis
375.
meta-analysis
376.
metabolic control analysis
377.
metabolic flux analysis
378.
metabolic pathways analysis
379.
metagenetic analysis
380.
metagenome analysis
381.
Metagenomic analysis
382.
metallographic analysis
383.
metaphors in analysis
384.
meta-regression analysis
385.
method of analysis
386.
method of signature analysis of outgoing traffic
387.
methods: data analysis
388.
MICMAC analysis
389.
microarray analysis
390.
microfacies analysis
391.
microscope analysis
392.
microscopy image analysis
393.
microstructural analysis
394.
milk analysis
395.
mixing analysis
396.
modal analysis
397.
Module Analysis
398.
Monetary policy analysis
399.
Monte Carlo analysis
400.
morphotectonic analysis
401.
motion analysis
402.
motor current signature analysis
403.
multi scale analysis
404.
multi-country analysis
405.
multicriteria analysis
406.
multi-criteria analysis
407.
Multi-criteria decision analysis
408.
multi-criteria-analysis
409.
multifractal analysis
410.
multiphysics analysis
411.
Multiple criteria analysis
412.
multiple factorial analysis
413.
multivariate analysis
414.
multivariate data analysis
415.
mutation analysis
416.
network analysis
417.
noise analysis
418.
non-Archimedean analysis
419.
non-commutative complex analysis
420.
nonlinear analysis
421.
numerical analysis
422.
organic residue analysis
423.
package test analysis
424.
paper micro-zone analysis
425.
parametric multi-impact analysis
426.
Pareto front analysis
427.
particle size analysis
428.
PCA analysis
429.
peptide analysis
430.
performance analysis
431.
performance analysis reconfigurable architectures
432.
PESTEL analysis
433.
phenotypic analysis
434.
phylogenetic analysis
435.
pollen analysis
436.
popularity analysis
437.
post-analysis of rules
438.
power mismatch analysis
439.
power system analysis computing
440.
predictive analysis
441.
principal component analysis
442.
principal component analysis (PCA)
443.
probabilistic analysis
444.
profitability analysis
445.
program analysis
446.
proximity analysis
447.
pulse analysis
448.
Pulse shape analysis
449.
pulse wave analysis
450.
pulse waveform analysis
451.
qualitative analysis
452.
qualitative and quantitative analysis
453.
qualitative comparison analysis
454.
qualitative network analysis
455.
quantitative analysis
456.
quantitative chemical analysis
457.
quantitative metal analysis
458.
quantitative risk analysis
459.
quantitative XRD analysis
460.
quasi steady state (QSS) analysis
461.
quasi-static analysis
462.
Raman analysis
463.
ramp behavior analysis
464.
ramping behaviour analysis
465.
ratio analysis
466.
Real-time Analysis
467.
real-time vibration analysis
468.
regression analysis
469.
Regression tree analysis
470.
reliability analysis
471.
risk analysis
472.
risk preference analysis
473.
robot-cell performance analysis
474.
robust stability analysis
475.
robustness analysis
476.
RTL analysis
477.
scenario analysis
478.
self-analysis
479.
SEM analysis
480.
SEM-analysis
481.
sensitivity analysis
482.
Sensors modeling and analysis
483.
sensory analysis
484.
sentiment analysis
485.
sequence analysis
486.
signal analysis
487.
similarity analysis
488.
simulation analysis
489.
simulation and analysis
490.
Simultaneous thermogravimetry (TG) and differential thermal analysis (DTA)
491.
single crystal analysis
492.
singular spectrum analysis (SSA)
493.
situational analysis
494.
sobol sensitivity analysis
495.
social network analysis
496.
social-economic analysis
497.
sociotechnical analysis
498.
spatial analysis
499.
spatial data analysis
500.
spatio-temporal analysis
501.
spectral analysis
502.
spectrogram analysis
503.
Spectrophotometric analysis
504.
spectrum analysis
505.
spore and pollen analysis
506.
stability analysis
507.
stable isotope analysis
508.
stakeholder analysis
509.
static analysis
510.
static timing analysis
511.
statistical analysis
512.
steady state analysis
513.
steady-state analysis
514.
steady‐state growth space analysis
515.
stedy-state analysis
516.
strength analysis
517.
string analysis
518.
structural analysis
519.
structural decomposition analysis
520.
structure computer analysis
521.
student data analysis
522.
suitability analysis
523.
surface wave analysis
524.
survival analysis
525.
SWOT analysis
526.
symbolic data analysis
527.
symmetry analysis
528.
synchronous reluctance motors thermal analysis
529.
system analysis
530.
system analysis and design
531.
system integrated analysis
532.
system-level analysis
533.
systems integrated analysis
534.
systems-theoretic process analysis (STPA)
535.
task analysis
536.
taste dilution analysis
537.
technical analysis
538.
technoeconomic analysis
539.
Techno-economic analysis
540.
technology analysis
541.
TEM and SEM analysis
542.
TEM-analysis
543.
term-frequency analysis
544.
testability analysis
545.
texture profile analysis
546.
the accuracy of monitoring in analysis of impact impulses
547.
thematic analysis
548.
thematic content analysis
549.
theoretical analysis
550.
thermal analysis
551.
thermal analysis tool
552.
thermodynamic analysis
553.
thermoeconomic analysis
554.
thermogravimetric analysis
555.
time analysis
556.
time domain analysis
557.
time series analysis
558.
timing analysis
559.
tolerance analysis
560.
topographic analysis
561.
training needs analysis
562.
Transdermal analysis patch
563.
transformer analysis
564.
transient analysis
565.
trend analysis
566.
uncertainty analysis
567.
urban analysis
568.
user click behaviour analysis
569.
value network analysis
570.
water analysis
571.
waveform analysis
572.
wavelet analysis
573.
weak signal analysis
574.
wear analysis
575.
western blot analysis
576.
vibrational analysis
577.
wind analysis
578.
visco-thermal analysis
579.
visits registration and statistical analysis
580.
work analysis
581.
X-ray analysis
582.
X-ray crystallographic analysis
583.
X-ray line-profile analysis
584.
XRD structure analysis
585.
XYZ analysis
586.
(computational fluid dynamics) CFD analysis
587.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
588.
UN GGE (United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security)
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT