Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security risk assessment (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/266)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Attribute evaluation on attack trees with incomplete information
Buldas, Ahto
;
Gadyatskaya, Olga
;
Lenin, Aleksandr
;
Mauw, Sjouke
;
Trujillo-Rasua, Roland
Computers & Security
2020
/
art. 101630, 17 p. : ill
https://doi.org/10.1016/j.cose.2019.101630
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
262
1.
security risk assessment
2.
security risk management
3.
ecological risk assessment
4.
environmental risk assessment
5.
military environment risk assessment
6.
models for risk assessment
7.
risk assessment
8.
risk assessment chemicals in the air
9.
semi-quantitative risk assessment method
10.
at-risk-of-poverty rates
11.
bank risk-taking
12.
bank-risk taking
13.
bankruptcy risk
14.
cancer risk
15.
cardiovascular risk
16.
cardiovascular risk factors
17.
climatic risk
18.
coastal risk index
19.
conditional value at risk (CVaR)
20.
Cost Weighted Factor for Risk Priority Number (CWFRPN)
21.
credit risk
22.
credit risk determinants
23.
cyber risk
24.
disaster risk reduction
25.
Economic risk
26.
elimination of risk
27.
environmental risk
28.
ESG risk
29.
farmer's risk criterion
30.
fish injury and mortality risk
31.
flood risk management
32.
health risk
33.
heart disease risk factors
34.
infection risk
35.
infection risk-based ventilation
36.
insurance risk
37.
kardiovaskulaarne risk
38.
knowledge risk
39.
knowledge risk management
40.
knowledge risk management (KRM)
41.
knowledge risk management in banking
42.
knowledge risk management in construction
43.
knowledge risk management in SMEs
44.
mould growth risk
45.
mould risk
46.
multi-risk/multi-criteria
47.
operational knowledge risk
48.
overheating risk
49.
perceived risk
50.
Polygenic risk score
51.
portfolio risk hedging
52.
potential risk
53.
pre-symptomatic period risk control
54.
proactive risk management
55.
process risk
56.
project risk management
57.
psychosocial risk factors
58.
quantitative risk analysis
59.
reactive risk management
60.
residual cardiovascular risk
61.
risk
62.
risk group for mental disorders
63.
risk allocation
64.
risk analysis
65.
risk assessments
66.
risk attitudes
67.
risk behavior
68.
risk classification
69.
risk evaluation model
70.
risk evaluation model development
71.
risk factors
72.
risk governance
73.
risk interdependence
74.
risk levels
75.
risk management
76.
risk management culture
77.
risk management in public organizations
78.
risk management model
79.
risk mitigation
80.
risk modelling
81.
risk of failure
82.
risk of mould growth
83.
risk prediction
84.
risk preference analysis
85.
risk prevention
86.
risk stratification
87.
risk transfer
88.
risk-adjusted performance
89.
risk-taking
90.
situational risk awareness
91.
standalone risk
92.
supply chain risk
93.
supply chain risk management
94.
systemic risk
95.
value at risk
96.
vascular risk factors
97.
3D risk assesment
98.
ad-hoc sensor networks security
99.
Automatic Security Verification
100.
Blockchain security
101.
cache security
102.
communication system security
103.
comprehensive system of economic security
104.
computer security
105.
cooperative security dilemma
106.
cyber security
107.
cyber security education
108.
cyber security exercises
109.
cyber security strategies
110.
cyber-security
111.
data security
112.
development of security cameras
113.
drinking water security
114.
economic security
115.
economic security of enterprise
116.
emotional security
117.
energy security
118.
energy security indicator
119.
graded security
120.
hardware security
121.
hardware security primitive
122.
human security
123.
information security
124.
internal security
125.
international security
126.
investment and innovation security
127.
IPv6 security
128.
IT security
129.
job security
130.
long-term security
131.
metadata model for security measures
132.
Middle Eastern security
133.
Mobile security
134.
national cyber security strategy
135.
national security
136.
NATO. Science for Peace and Security Program
137.
network security
138.
network security monitoring
139.
OSCE (Organization for Security and Co-operation in Europe)
140.
passenger’s security
141.
policy-based routing security
142.
political and security cultures
143.
post-quantum security
144.
power system security
145.
quantitative security
146.
regional security
147.
RISC-V Security Verification
148.
security
149.
security and privacy
150.
security and privacy in smart grids
151.
Security Assertion Mining
152.
security closure
153.
Security Coverage
154.
security dataset
155.
security dilemma
156.
Security evaluation
157.
security log analysis
158.
security management
159.
security model
160.
security monitoring
161.
security notion
162.
security objectives
163.
security of data
164.
security of supply
165.
security operation center
166.
security patterns
167.
security problem definition
168.
security proof
169.
security protocols
170.
security requirements
171.
security requirements engineering
172.
security strategies
173.
security systems for military objects
174.
security testing
175.
security training
176.
security verification
177.
social security planning
178.
societal security
179.
system of economic security
180.
system security
181.
terrorism security
182.
transmission System Security
183.
voting privacy and security
184.
Accuracy Assessment
185.
assessment
186.
assessment category
187.
assessment error
188.
assessment methods
189.
assessment of calorific value and moisture content
190.
assessment of voltage unbalance emission
191.
assessment of voltage unbalance sources
192.
assessment schemes
193.
automated quality assessment
194.
bridge assessment
195.
building sustainability assessment
196.
clinical assessment
197.
coastal vulnerability assessment
198.
comparative assessment
199.
compliance assessment
200.
computer‐aided assessment
201.
condition assessment
202.
criticality assessment
203.
cumulative effects assessment
204.
cyber battle damage assessment
205.
cyber impact assessment
206.
DPSIR assessment framework
207.
early stage energy assessment
208.
economic regulation assessment
209.
energy assessment
210.
entrepreneurial ecosystem assessment
211.
environmental assessment
212.
environmental impact assessment
213.
Environmental impact assessment (EIA)
214.
environmental performance assessment and simulation
215.
failure consequence assessment
216.
fatigue assessment
217.
FIM + FAM (functional assessment measure)
218.
flow assessment methods
219.
gait assessment
220.
grounding damage assessment
221.
habitat assessment
222.
impact assessment
223.
in-situ assessment
224.
integrated assessment
225.
intellectualization of assessment
226.
life cycle assessment
227.
life cycle assessment (LCA)
228.
life cycle sustainability assessment
229.
lifecycle assessment
230.
life-cycle assessment
231.
m-assessment
232.
multiple criteria assessment
233.
nutrition assessment
234.
oocyte assessment
235.
outcomes assessment
236.
performance assessment
237.
policy assessment
238.
probabilistic assessment
239.
quality assessment
240.
remaining life assessment
241.
remaining lifetime assessment
242.
resiliency assessment
243.
resource assessment
244.
road safety impact assessment
245.
safety assessment tool
246.
Self assessment tool
247.
self-assessment
248.
self-assessment tool
249.
signal quality assessment
250.
skill assessment
251.
skills assessment
252.
Social impact assessment
253.
spatial glare assessment
254.
strategic environmental assessment
255.
sustainability assessment
256.
sustainability assessment (DSS-HS)
257.
sustainability assessment method
258.
sustainable assessment tools
259.
thermodynamic assessment
260.
training needs assessment
261.
visual assessment
262.
vulnerability assessment
märksõna
4
1.
kardiovaskulaarne risk
2.
risk
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT