Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
quantitative security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/148)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
146
1.
quantitative security
2.
absolute quantitative proteomics
3.
current state capability quantitative estimates
4.
qualitative and quantitative analysis
5.
quantitative
6.
quantitative analysis
7.
quantitative and qualitative criteria
8.
quantitative association rule mining
9.
quantitative chemical analysis
10.
quantitative easing
11.
quantitative land cover reconstructions
12.
quantitative lignin determination
13.
quantitative logic
14.
quantitative metal analysis
15.
quantitative method
16.
quantitative methods
17.
quantitative past land cover
18.
quantitative proteomics
19.
quantitative risk analysis
20.
quantitative stratigraph
21.
quantitative stratigraphy
22.
quantitative study
23.
quantitative XRD analysis
24.
semi-quantitative risk assessment method
25.
ad-hoc sensor networks security
26.
Automatic Security Verification
27.
Blockchain security
28.
cache security
29.
cloud security
30.
communication system security
31.
comprehensive system of economic security
32.
computer security
33.
cooperative security dilemma
34.
cyber security
35.
cyber security education
36.
cyber security exercises
37.
cyber security monitoring
38.
cyber security strategies
39.
cyber-security
40.
data and information security
41.
data security
42.
development of security cameras
43.
digital security practices
44.
drinking water security
45.
economic security
46.
economic security of enterprise
47.
emotional security
48.
energy security
49.
energy security indicator
50.
Estonian information security standard
51.
graded security
52.
hardware security
53.
hardware security primitive
54.
high level of security
55.
Homeland security
56.
human security
57.
information security
58.
information security and privacy
59.
initial level of security
60.
internal security
61.
international security
62.
investment and innovation security
63.
IPv6 security
64.
IT security
65.
IT security management
66.
job security
67.
long-term security
68.
maritime cyber security
69.
maritime cyber security operations centers
70.
Maritime Security Operations Center (M-SOC)
71.
medium level of security
72.
metadata model for security measures
73.
Middle Eastern security
74.
Mobile security
75.
national cyber security strategy
76.
national security
77.
NATO. Science for Peace and Security Program
78.
network security
79.
network security monitoring
80.
OSCE (Organization for Security and Co-operation in Europe)
81.
passenger’s security
82.
policy-based routing security
83.
political and security cultures
84.
post-quantum security
85.
power system security
86.
regional security
87.
RISC-V Security Verification
88.
Safety and Security in Sea Transportation
89.
safety and security testing
90.
security
91.
security adaptation
92.
security alert prioritization
93.
security analysis
94.
security and justice (AFSJ)
95.
Security and political science
96.
security and privacy
97.
security and privacy in smart grids
98.
Security Assertion
99.
Security Assertion Mining
100.
security closure
101.
Security Coverage
102.
security dataset
103.
security dilemma
104.
Security evaluation
105.
security evaluation instruments
106.
Security Level Evaluation
107.
Security limitations
108.
security log analysis
109.
security management
110.
security model
111.
security monitoring
112.
security notion
113.
security objectives
114.
security of data
115.
security of supply
116.
security operation center
117.
security operations center
118.
security patterns
119.
security policy
120.
security problem definition
121.
security proof
122.
security protocols
123.
security requirements
124.
security requirements engineering
125.
security research
126.
security risk assessment
127.
security risk management
128.
security risks
129.
security science and technology
130.
security strategies
131.
security systems for military objects
132.
security testing
133.
security training
134.
security verification
135.
security-by-design
136.
social security planning
137.
societal security
138.
software security
139.
software security level
140.
software security subcharacteristics
141.
sufficient level of security
142.
system of economic security
143.
system security
144.
terrorism security
145.
transmission System Security
146.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT