Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
internal security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/159)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
European internal security interests and Brexit. Legal and operational aspects of the post–Brexit cooperation model
Loik, Ramon
Romanian journal of European affairs
2020
/
p. 5-17
http://rjea.ier.gov.ro/en/issues/rjea-vol-20-no-2-december-2020/
journal article
2
journal article
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
journal article
Number of records 2, displaying
1 - 2
keyword
157
1.
internal security
2.
corresponding internal variable
3.
dual internal variables
4.
hierarchical internal variable
5.
internal audit
6.
internal barriers
7.
internal combustion engine
8.
internal combustion engines
9.
internal conditions
10.
internal control
11.
Internal coopetition
12.
internal coupling
13.
internal damping
14.
internal devaluation
15.
internal discharge
16.
internal friction
17.
internal heat gain
18.
internal insulation
19.
Internal Market and Customs Union
20.
internal mechanics
21.
internal partial discharge
22.
internal pressure
23.
Internal Rate of Return (IRR)
24.
internal representations
25.
internal Rossby radius
26.
internal seiches
27.
internal solitons
28.
internal variables
29.
internal wave
30.
internal waves
31.
internal-flow hydraulic modelling
32.
internal-fow head
33.
single and dual internal variables
34.
ad-hoc sensor networks security
35.
Automatic Security Verification
36.
Blockchain security
37.
cache security
38.
cloud security
39.
communication system security
40.
comprehensive system of economic security
41.
computer security
42.
cooperative security dilemma
43.
cyber security
44.
cyber security education
45.
cyber security exercises
46.
cyber security monitoring
47.
cyber security monitoring in maritime
48.
cyber security strategies
49.
cyber-physical system security
50.
cyber-security
51.
data and information security
52.
data security
53.
development of security cameras
54.
digital security practices
55.
drinking water security
56.
economic security
57.
economic security of enterprise
58.
emotional security
59.
energy security
60.
energy security indicator
61.
Estonian information security standard
62.
graded security
63.
hardware security
64.
hardware security primitive
65.
high level of security
66.
Homeland security
67.
human security
68.
information security
69.
information security and privacy
70.
initial level of security
71.
international security
72.
investment and innovation security
73.
IPv6 security
74.
IT security
75.
IT security management
76.
job security
77.
long-term security
78.
maritime cyber security
79.
maritime cyber security operations centers
80.
Maritime Security Operations Center (M-SOC)
81.
medium level of security
82.
metadata model for security measures
83.
Middle Eastern security
84.
Mobile security
85.
national cyber security strategy
86.
national security
87.
NATO. Science for Peace and Security Program
88.
network security
89.
network security monitoring
90.
OSCE (Organization for Security and Co-operation in Europe)
91.
passenger’s security
92.
policy-based routing security
93.
political and security cultures
94.
post-quantum security
95.
power system security
96.
quantitative security
97.
regional security
98.
RISC-V Security Verification
99.
Safety and Security in Sea Transportation
100.
safety and security testing
101.
security
102.
security adaptation
103.
security alert prioritization
104.
security analysis
105.
security and justice (AFSJ)
106.
Security and political science
107.
security and privacy
108.
security and privacy in smart grids
109.
Security Assertion
110.
Security Assertion Mining
111.
security closure
112.
Security Coverage
113.
security dataset
114.
security dilemma
115.
Security evaluation
116.
security evaluation instruments
117.
Security Level Evaluation
118.
Security limitations
119.
security log analysis
120.
security management
121.
security model
122.
security monitoring
123.
security notion
124.
security objectives
125.
security of data
126.
security of supply
127.
security operation center
128.
security operations center
129.
security patterns
130.
security policy
131.
security problem definition
132.
security proof
133.
security protocols
134.
security requirements
135.
security requirements engineering
136.
security research
137.
security risk assessment
138.
security risk management
139.
security risks
140.
security science and technology
141.
security strategies
142.
security systems for military objects
143.
security testing
144.
security training
145.
security verification
146.
security-by-design
147.
social security planning
148.
societal security
149.
software security
150.
software security level
151.
software security subcharacteristics
152.
sufficient level of security
153.
system of economic security
154.
system security
155.
terrorism security
156.
transmission System Security
157.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT