Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
national security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/129)
Export
export all inquiry results
(3)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
book article
2
newspaper article
Global knowledge warfare : using strategic imagination to harness uncertainty and fear
Shiraev, Eric
;
Mölder, Holger
The cipher brief
2020
"Global knowledge warfare"
newspaper article
3
book article
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
book article
Number of records 3, displaying
1 - 3
keyword
126
1.
national security
2.
national cyber security strategy
3.
international security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
graded security
26.
hardware security
27.
hardware security primitive
28.
human security
29.
information security
30.
internal security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
NATO. Science for Peace and Security Program
40.
network security
41.
network security monitoring
42.
OSCE (Organization for Security and Co-operation in Europe)
43.
passenger’s security
44.
policy-based routing security
45.
political and security cultures
46.
post-quantum security
47.
power system security
48.
quantitative security
49.
regional security
50.
RISC-V Security Verification
51.
security
52.
security and privacy
53.
security and privacy in smart grids
54.
Security Assertion Mining
55.
security closure
56.
Security Coverage
57.
security dataset
58.
security dilemma
59.
Security evaluation
60.
security log analysis
61.
security management
62.
security model
63.
security monitoring
64.
security notion
65.
security objectives
66.
security of data
67.
security of supply
68.
security operation center
69.
security patterns
70.
security problem definition
71.
security proof
72.
security protocols
73.
security requirements
74.
security requirements engineering
75.
security risk assessment
76.
security risk management
77.
security strategies
78.
security systems for military objects
79.
security testing
80.
security training
81.
security verification
82.
social security planning
83.
societal security
84.
system of economic security
85.
system security
86.
terrorism security
87.
transmission System Security
88.
voting privacy and security
89.
comprehensive national defense
90.
Estonian National Health Information System
91.
ethnic and national identity
92.
European Federation of National Academies of Sciences and Humanities All European Academies, (ALLEA)
93.
gross national happiness
94.
national dietary survey
95.
national accounting practices
96.
National archive
97.
National building recommendation
98.
national competition authority
99.
national court
100.
national courts
101.
national culture
102.
national curricula
103.
national defense
104.
national economy
105.
national embeddedness values
106.
national emergency
107.
national energy policy
108.
national identity
109.
national innovation system
110.
national jurisdiction
111.
national legislation
112.
national maritime defence
113.
National memory
114.
national merger regulations
115.
national procedural provisions
116.
national provision prohibiting abuses of dominance
117.
national provision prohibiting anticompetitive agreements
118.
national regulation
119.
national requirements
120.
national sovereignty
121.
national spatial plan
122.
national survey
123.
Nigeria's National data protection regulation
124.
Polish-Lithuanian Commonwealth Commission for National Education (Komisja Educacji Narodowej, KEN)
125.
relationship between national law and EU law
126.
19th issue of the National Building Regulations of Iran (NBRI)
subject term
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
China National Petroleum Corporation
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT