Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security risk assessment (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/266)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
262
1.
security risk assessment
2.
security risk management
3.
ecological risk assessment
4.
environmental risk assessment
5.
military environment risk assessment
6.
models for risk assessment
7.
risk assessment
8.
risk assessment chemicals in the air
9.
semi-quantitative risk assessment method
10.
at-risk-of-poverty rates
11.
bank risk-taking
12.
bank-risk taking
13.
bankruptcy risk
14.
cancer risk
15.
cardiovascular risk
16.
cardiovascular risk factors
17.
climatic risk
18.
coastal risk index
19.
conditional value at risk (CVaR)
20.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
21.
credit risk
22.
credit risk determinants
23.
cyber risk
24.
disaster risk reduction
25.
Economic risk
26.
elimination of risk
27.
environmental risk
28.
ESG risk
29.
farmer's risk criterion
30.
fish injury and mortality risk
31.
flood risk management
32.
health risk
33.
heart disease risk factors
34.
infection risk
35.
infection risk-based ventilation
36.
insurance risk
37.
kardiovaskulaarne risk
38.
knowledge risk
39.
knowledge risk management
40.
knowledge risk management (KRM)
41.
knowledge risk management in banking
42.
knowledge risk management in construction
43.
knowledge risk management in SMEs
44.
mould growth risk
45.
mould risk
46.
multi-risk/multi-criteria
47.
operational knowledge risk
48.
overheating risk
49.
perceived risk
50.
Polygenic risk score
51.
portfolio risk hedging
52.
potential risk
53.
pre-symptomatic period risk control
54.
proactive risk management
55.
process risk
56.
project risk management
57.
psychosocial risk factors
58.
quantitative risk analysis
59.
reactive risk management
60.
residual cardiovascular risk
61.
risk
62.
risk group for mental disorders
63.
risk allocation
64.
risk analysis
65.
risk assessments
66.
risk attitudes
67.
risk behavior
68.
risk classification
69.
risk evaluation model
70.
risk evaluation model development
71.
risk factors
72.
risk governance
73.
risk interdependence
74.
risk levels
75.
risk management
76.
risk management culture
77.
risk management in public organizations
78.
risk management model
79.
risk mitigation
80.
risk modelling
81.
risk of failure
82.
risk of mould growth
83.
risk prediction
84.
risk preference analysis
85.
risk prevention
86.
risk stratification
87.
risk transfer
88.
risk-adjusted performance
89.
risk-taking
90.
situational risk awareness
91.
standalone risk
92.
supply chain risk
93.
supply chain risk management
94.
systemic risk
95.
value at risk
96.
vascular risk factors
97.
3D risk assesment
98.
ad-hoc sensor networks security
99.
Automatic Security Verification
100.
Blockchain security
101.
cache security
102.
communication system security
103.
comprehensive system of economic security
104.
computer security
105.
cooperative security dilemma
106.
cyber security
107.
cyber security education
108.
cyber security exercises
109.
cyber security strategies
110.
cyber-security
111.
data security
112.
development of security cameras
113.
drinking water security
114.
economic security
115.
economic security of enterprise
116.
emotional security
117.
energy security
118.
energy security indicator
119.
graded security
120.
hardware security
121.
hardware security primitive
122.
human security
123.
information security
124.
internal security
125.
international security
126.
investment and innovation security
127.
IPv6 security
128.
IT security
129.
job security
130.
long-term security
131.
metadata model for security measures
132.
Middle Eastern security
133.
Mobile security
134.
national cyber security strategy
135.
national security
136.
NATO. Science for Peace and Security Program
137.
network security
138.
network security monitoring
139.
OSCE (Organization for Security and Co-operation in Europe)
140.
passenger’s security
141.
policy-based routing security
142.
political and security cultures
143.
post-quantum security
144.
power system security
145.
quantitative security
146.
regional security
147.
RISC-V Security Verification
148.
security
149.
security and privacy
150.
security and privacy in smart grids
151.
Security Assertion Mining
152.
security closure
153.
Security Coverage
154.
security dataset
155.
security dilemma
156.
Security evaluation
157.
security log analysis
158.
security management
159.
security model
160.
security monitoring
161.
security notion
162.
security objectives
163.
security of data
164.
security of supply
165.
security operation center
166.
security patterns
167.
security problem definition
168.
security proof
169.
security protocols
170.
security requirements
171.
security requirements engineering
172.
security strategies
173.
security systems for military objects
174.
security testing
175.
security training
176.
security verification
177.
social security planning
178.
societal security
179.
system of economic security
180.
system security
181.
terrorism security
182.
transmission System Security
183.
voting privacy and security
184.
Accuracy Assessment
185.
assessment
186.
assessment category
187.
assessment error
188.
assessment methods
189.
assessment of calorific value and moisture content
190.
assessment of voltage unbalance emission
191.
assessment of voltage unbalance sources
192.
assessment schemes
193.
automated quality assessment
194.
bridge assessment
195.
building sustainability assessment
196.
clinical assessment
197.
coastal vulnerability assessment
198.
comparative assessment
199.
compliance assessment
200.
computer‐aided assessment
201.
condition assessment
202.
criticality assessment
203.
cumulative effects assessment
204.
cyber battle damage assessment
205.
cyber impact assessment
206.
DPSIR assessment framework
207.
early stage energy assessment
208.
economic regulation assessment
209.
energy assessment
210.
entrepreneurial ecosystem assessment
211.
environmental assessment
212.
environmental impact assessment
213.
Environmental impact assessment (EIA)
214.
environmental performance assessment and simulation
215.
failure consequence assessment
216.
fatigue assessment
217.
FIM + FAM (functional assessment measure)
218.
flow assessment methods
219.
gait assessment
220.
grounding damage assessment
221.
habitat assessment
222.
impact assessment
223.
in-situ assessment
224.
integrated assessment
225.
intellectualization of assessment
226.
life cycle assessment
227.
life cycle assessment (LCA)
228.
life cycle sustainability assessment
229.
lifecycle assessment
230.
life-cycle assessment
231.
m-assessment
232.
multiple criteria assessment
233.
nutrition assessment
234.
oocyte assessment
235.
outcomes assessment
236.
performance assessment
237.
policy assessment
238.
probabilistic assessment
239.
quality assessment
240.
remaining life assessment
241.
remaining lifetime assessment
242.
resiliency assessment
243.
resource assessment
244.
road safety impact assessment
245.
safety assessment tool
246.
Self assessment tool
247.
self-assessment
248.
self-assessment tool
249.
signal quality assessment
250.
skill assessment
251.
skills assessment
252.
Social impact assessment
253.
spatial glare assessment
254.
strategic environmental assessment
255.
sustainability assessment
256.
sustainability assessment (DSS-HS)
257.
sustainability assessment method
258.
sustainable assessment tools
259.
thermodynamic assessment
260.
training needs assessment
261.
visual assessment
262.
vulnerability assessment
subject term
4
1.
kardiovaskulaarne risk
2.
risk
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT