Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security risk assessment (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/349)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
345
1.
security risk assessment
2.
security risk management
3.
Cardiovascular risk assessment
4.
comprehensive climate risk assessment
5.
ecological risk assessment
6.
environmental risk assessment
7.
machinery risk assessment
8.
military environment risk assessment
9.
models for risk assessment
10.
risk assessment
11.
risk assessment chemicals in the air
12.
rrivacy risk assessment
13.
semi-quantitative risk assessment method
14.
accrual-based credit risk model
15.
at-risk-of-poverty rates
16.
bank risk-taking
17.
bank-risk taking
18.
bankruptcy risk
19.
cancer risk
20.
cardiovascular risk
21.
cardiovascular risk factors
22.
climatic risk
23.
coastal risk index
24.
conceptual framework for safety/risk analysis
25.
conditional value at risk (CVaR)
26.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
27.
credit risk
28.
credit risk determinants
29.
credit risk forecasting
30.
credit risk modelling
31.
cyber risk
32.
cyber risk management in shipping
33.
disaster risk reduction
34.
Economic risk
35.
elimination of risk
36.
enterprise risk management
37.
environmental risk
38.
ergonomic risk
39.
ESG risk
40.
farmer's risk criterion
41.
fish injury and mortality risk
42.
flood risk management
43.
flood risk modelling
44.
health risk
45.
heart disease risk factors
46.
infection risk
47.
infection risk calculators
48.
infection risk tools
49.
infection risk-based ventilation
50.
insurance risk
51.
kardiovaskulaarne risk
52.
knowledge risk
53.
knowledge risk management
54.
knowledge risk management (KRM)
55.
knowledge risk management in banking
56.
knowledge risk management in construction
57.
knowledge risk management in SMEs
58.
Moisture risk mitigation
59.
mould growth risk
60.
mould risk
61.
multi-risk/multi-criteria
62.
navigation risk
63.
navigation risk management course
64.
operational knowledge risk
65.
overheating risk
66.
perceived risk
67.
policy risk
68.
Polygenic risk
69.
Polygenic risk score
70.
portfolio risk hedging
71.
potential risk
72.
pre-symptomatic period risk control
73.
proactive risk management
74.
process risk
75.
project risk management
76.
psychosocial risk factors
77.
quantitative risk analysis
78.
reactive risk management
79.
residual cardiovascular risk
80.
risk
81.
risk group for mental disorders
82.
risk allocation
83.
risk analysis
84.
risk assessments
85.
risk attitudes
86.
risk behavior
87.
risk classification
88.
risk coupling effects
89.
risk evaluation model
90.
risk evaluation model development
91.
risk event chain analyses
92.
risk factors
93.
risk governance
94.
risk interdependence
95.
risk levels
96.
risk management
97.
risk management culture
98.
risk management in public organizations
99.
risk management model
100.
risk mitigation
101.
risk modelling
102.
risk of failure
103.
risk of mould growth
104.
risk prediction
105.
risk preference analysis
106.
risk prevention
107.
risk reduction
108.
risk stratification
109.
risk transfer
110.
risk-adjusted performance
111.
risk-based laws
112.
risk-based management
113.
risk-taking
114.
risk-taking behavior
115.
ship collision risk
116.
situational risk awareness
117.
standalone risk
118.
supply chain risk
119.
supply chain risk management
120.
systemic risk
121.
tourists’ perceived travel risk
122.
value at risk
123.
vascular risk factors
124.
3D risk assesment
125.
ad-hoc sensor networks security
126.
Automatic Security Verification
127.
Blockchain security
128.
cache security
129.
cloud security
130.
communication system security
131.
comprehensive system of economic security
132.
computer security
133.
cooperative security dilemma
134.
cyber security
135.
cyber security education
136.
cyber security exercises
137.
cyber security monitoring
138.
cyber security strategies
139.
cyber-security
140.
data and information security
141.
data security
142.
development of security cameras
143.
digital security practices
144.
drinking water security
145.
economic security
146.
economic security of enterprise
147.
emotional security
148.
energy security
149.
energy security indicator
150.
Estonian information security standard
151.
graded security
152.
hardware security
153.
hardware security primitive
154.
high level of security
155.
Homeland security
156.
human security
157.
information security
158.
information security and privacy
159.
initial level of security
160.
internal security
161.
international security
162.
investment and innovation security
163.
IPv6 security
164.
IT security
165.
IT security management
166.
job security
167.
long-term security
168.
maritime cyber security
169.
maritime cyber security operations centers
170.
Maritime Security Operations Center (M-SOC)
171.
medium level of security
172.
metadata model for security measures
173.
Middle Eastern security
174.
Mobile security
175.
national cyber security strategy
176.
national security
177.
NATO. Science for Peace and Security Program
178.
network security
179.
network security monitoring
180.
OSCE (Organization for Security and Co-operation in Europe)
181.
passenger’s security
182.
policy-based routing security
183.
political and security cultures
184.
post-quantum security
185.
power system security
186.
quantitative security
187.
regional security
188.
RISC-V Security Verification
189.
Safety and Security in Sea Transportation
190.
safety and security testing
191.
security
192.
security adaptation
193.
security alert prioritization
194.
security analysis
195.
security and justice (AFSJ)
196.
Security and political science
197.
security and privacy
198.
security and privacy in smart grids
199.
Security Assertion
200.
Security Assertion Mining
201.
security closure
202.
Security Coverage
203.
security dataset
204.
security dilemma
205.
Security evaluation
206.
security evaluation instruments
207.
Security Level Evaluation
208.
Security limitations
209.
security log analysis
210.
security management
211.
security model
212.
security monitoring
213.
security notion
214.
security objectives
215.
security of data
216.
security of supply
217.
security operation center
218.
security operations center
219.
security patterns
220.
security policy
221.
security problem definition
222.
security proof
223.
security protocols
224.
security requirements
225.
security requirements engineering
226.
security research
227.
security risks
228.
security science and technology
229.
security strategies
230.
security systems for military objects
231.
security testing
232.
security training
233.
security verification
234.
security-by-design
235.
social security planning
236.
societal security
237.
software security
238.
software security level
239.
software security subcharacteristics
240.
sufficient level of security
241.
system of economic security
242.
system security
243.
terrorism security
244.
transmission System Security
245.
voting privacy and security
246.
Accuracy Assessment
247.
assessment
248.
assessment and testing
249.
assessment category
250.
assessment error
251.
assessment method
252.
assessment methods
253.
assessment of calorific value and moisture content
254.
assessment of voltage unbalance emission
255.
assessment of voltage unbalance sources
256.
assessment schemes
257.
automated quality assessment
258.
bridge assessment
259.
building sustainability assessment
260.
clinical assessment
261.
coastal vulnerability assessment
262.
comparative assessment
263.
compliance assessment
264.
computer‐aided assessment
265.
condition assessment
266.
consistency assessment
267.
criticality assessment
268.
cumulative effects assessment
269.
cyber battle damage assessment
270.
cyber impact assessment
271.
Design and assessment methods
272.
dietary assessment
273.
DPSIR assessment framework
274.
early stage energy assessment
275.
early-stage lifecycle assessment integration
276.
E-assessment
277.
economic regulation assessment
278.
energy assessment
279.
entrepreneurial ecosystem assessment
280.
environmental assessment
281.
environmental impact assessment
282.
Environmental impact assessment (EIA)
283.
environmental performance assessment and simulation
284.
expert assessment
285.
failure consequence assessment
286.
fatigue assessment
287.
FIM + FAM (functional assessment measure)
288.
flow assessment methods
289.
gait assessment
290.
grounding damage assessment
291.
habitat assessment
292.
hazard assessment
293.
hybrid assessment
294.
Image Quality Assessment
295.
impact assessment
296.
in-situ assessment
297.
integrated assessment
298.
intellectualization of assessment
299.
life cycle assessment
300.
life cycle assessment (LCA)
301.
life cycle sustainability assessment
302.
lifecycle assessment
303.
life-cycle assessment
304.
m-assessment
305.
material quality assessment
306.
multiple criteria assessment
307.
nutrition assessment
308.
oocyte assessment
309.
outcomes assessment
310.
performance assessment
311.
policy assessment
312.
probabilistic assessment
313.
quality assessment
314.
readiness assessment
315.
reliability assessment
316.
reliability assessment and enhancement
317.
remaining life assessment
318.
remaining lifetime assessment
319.
resilience assessment
320.
resiliency assessment
321.
resource assessment
322.
road safety impact assessment
323.
safety assessment tool
324.
Self assessment tool
325.
self-assessment
326.
self-assessment tool
327.
signal quality assessment
328.
skill assessment
329.
skills assessment
330.
skills assessment of programming and mathematics
331.
Social impact assessment
332.
spatial glare assessment
333.
strategic environmental assessment
334.
sustainability assessment
335.
sustainability assessment (DSS-HS)
336.
sustainability assessment method
337.
sustainable assessment tools
338.
techno-economic assessment
339.
thermodynamic assessment
340.
training needs assessment
341.
ultimate strength assessment
342.
wave energy resource assessment
343.
visual assessment
344.
Visual sensory assessment
345.
vulnerability assessment
subject term
4
1.
kardiovaskulaarne risk
2.
risk
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT