Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
regional security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/144)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Association of Southeast Asian Nations (ASEAN)
Valuch, Josef
;
Hamulak, Ondrej
International conflict and security law : a research handbook
2022
/
p. 595-608
https://doi.org/10.1007/978-94-6265-515-7_27
book article
2
book article
The Islamic State, clash of civilizations and their impact on the development of contemporary international relations
Mölder, Holger
Cultural crossroads in the Middle East : the historical, cultural and political legacy of intercultural dialogue and conflict from the ancient Near East to the present day
2020
/
p. 314-345
https://www.ester.ee/record=b5259885*est
book article
Number of records 2, displaying
1 - 2
keyword
141
1.
regional security
2.
Burtnieki Regional Stage
3.
Ecological Regional Ocean Model (ERGOM)
4.
Economic growth and aggregate productivity regional government analysis
5.
gross regional product
6.
Haljala Regional Stage
7.
Kunda Regional Stage
8.
melanoma loco-regional treatment
9.
R11 - regional economic activity
10.
regional aircraft
11.
regional airport
12.
regional airports
13.
Regional and local government policy
14.
regional aviation
15.
regional branding
16.
regional chemotherapy
17.
regional cooperation
18.
regional co-operation
19.
regional courts
20.
regional courts of justice
21.
regional development
22.
regional economic integration
23.
regional economies
24.
regional extinctions
25.
regional geoid
26.
regional geoid modelling
27.
Regional governments
28.
regional higher education institutions
29.
regional innovation
30.
regional innovation networks
31.
regional innovation strategies on smart specialization (RIS3)
32.
regional institutions
33.
Regional integrated energy system (RIES)
34.
regional integration
35.
regional learning
36.
regional management
37.
regional modelling
38.
Regional oceanography
39.
regional organisations
40.
regional policy
41.
regional sediment balance
42.
regional specialization
43.
regional terminals
44.
regional visual read
45.
Vojvyv Regional Stage
46.
ad-hoc sensor networks security
47.
Automatic Security Verification
48.
Blockchain security
49.
cache security
50.
communication system security
51.
comprehensive system of economic security
52.
computer security
53.
cooperative security dilemma
54.
cyber security
55.
cyber security education
56.
cyber security exercises
57.
cyber security strategies
58.
cyber-security
59.
data security
60.
development of security cameras
61.
drinking water security
62.
economic security
63.
economic security of enterprise
64.
emotional security
65.
energy security
66.
energy security indicator
67.
Estonian information security standard
68.
graded security
69.
hardware security
70.
hardware security primitive
71.
human security
72.
information security
73.
internal security
74.
international security
75.
investment and innovation security
76.
IPv6 security
77.
IT security
78.
IT security management
79.
job security
80.
long-term security
81.
metadata model for security measures
82.
Middle Eastern security
83.
Mobile security
84.
national cyber security strategy
85.
national security
86.
NATO. Science for Peace and Security Program
87.
network security
88.
network security monitoring
89.
OSCE (Organization for Security and Co-operation in Europe)
90.
passenger’s security
91.
policy-based routing security
92.
political and security cultures
93.
post-quantum security
94.
power system security
95.
quantitative security
96.
RISC-V Security Verification
97.
security
98.
security adaptation
99.
security analysis
100.
security and justice (AFSJ)
101.
security and privacy
102.
security and privacy in smart grids
103.
Security Assertion Mining
104.
security closure
105.
Security Coverage
106.
security dataset
107.
security dilemma
108.
Security evaluation
109.
security evaluation instruments
110.
security log analysis
111.
security management
112.
security model
113.
security monitoring
114.
security notion
115.
security objectives
116.
security of data
117.
security of supply
118.
security operation center
119.
security operations center
120.
security patterns
121.
security policy
122.
security problem definition
123.
security proof
124.
security protocols
125.
security requirements
126.
security requirements engineering
127.
security risk assessment
128.
security risk management
129.
security strategies
130.
security systems for military objects
131.
security testing
132.
security training
133.
security verification
134.
security-by-design
135.
social security planning
136.
societal security
137.
system of economic security
138.
system security
139.
terrorism security
140.
transmission System Security
141.
voting privacy and security
subject term
3
1.
European Regional Development Fund
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT