Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of supply (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/194)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Future outlook and current situation for security of gas supply in Eastern Baltic region
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
World Academy of Science, Engineering and Technology. International journal of social, human science and engineering
2013
/
p. 1287-1294 : ill
journal article
2
journal article
Improving security of gas supply in Eastern Baltic region : LNG terminal alternatives
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
International journal of energy
2014
/
p. 1-7
journal article
3
book article
Security of gas supply in Eastern Baltic region : current situation and future outlook
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
Recent Advances in Energy Planning and Environment : proceedings of the 7th WSEAS International Conference on Energy Planning, Energy Saving, Environmental Education (EPESE '13), Paris, France, October 29-31, 2013
2013
/
p. 71-80 : ill
book article
4
book article
The Eastern Baltic LNG terminal as a prospect to improve security of regional gas supply
Kõrbe Kaare, Kati
;
Koppel, Ott
;
Leppiman, Ando
Recent Advances in Environment, Energy, Ecosystems and Development : proceedings of the 2013 International Conference on Environment, Energy, Ecosystems and Development (EEEAD 2013), Venice, Italy, September 28-30, 2013
2013
/
p. 158-164
book article
5
book article
Wind park and transmission network cooperation considering Grid Code requirements
Kilter, Jako
;
Dubbelman, Edgar
;
Palu, Ivo
;
Niitsoo, Jaan
Electrical and Control Technologies : proceedings of the the 7th International Conference on Electrical and Control Technologies ECT-2012
2012
/
p. 183-188 : ill
https://www.researchgate.net/publication/290252818_Wind_park_and_transmission_network_cooperation_considering_Grid_Code_requirements
book article
Number of records 5, displaying
1 - 5
keyword
192
1.
security of supply
2.
automated supply air temperature (ASAT)
3.
auxiliary power supply
4.
carbon-neutral energy supply
5.
DC power supply
6.
demand & supply chain management
7.
digital supply chain
8.
diversified supply options
9.
electricity supply industry deregulation
10.
fashion supply chains
11.
global supply chains
12.
green supply chain management
13.
grid supply
14.
grid-connected power supply
15.
Labour supply
16.
legume supply chain
17.
limitation of supply
18.
local power supply system
19.
Logistics and supply chain management
20.
maitime supply chains
21.
metal stirring combined DC and AC supply
22.
money supply
23.
obligation to supply
24.
off-grid hybrid power supply
25.
power supply
26.
quality of supply
27.
refusal to supply
28.
Renewable electricity supply
29.
road construction supply chain
30.
service supply chain
31.
smart supply chains
32.
supply
33.
supply and demand
34.
supply and use tables
35.
supply chain
36.
supply chain (SC)
37.
Supply chain adaptability
38.
supply chain competences
39.
supply chain curricula
40.
supply chain engineering
41.
supply chain integration
42.
supply chain management
43.
supply chain model framework
44.
supply chain operations reference (SCOR)
45.
supply chain operations reference (SCOR) model
46.
supply chain planning
47.
supply chain risk
48.
supply chain risk management
49.
supply chain simulation
50.
supply chain skills
51.
supply chain traceability
52.
supply chains
53.
supply networks
54.
supply routes for natural gas
55.
supply shock
56.
supply systems
57.
supply voltage quality
58.
sustainable supply chain management
59.
Sustainable supply chains management
60.
sustainalble supply chain management
61.
switch mode power supply
62.
switchedmode power supply
63.
switched-mode power supply
64.
teaching supply chain management
65.
termination of supply
66.
transparent supply chain
67.
uninterruptible power supply (UPS)
68.
welding power supply
69.
ad-hoc sensor networks security
70.
Automatic Security Verification
71.
Blockchain security
72.
cache security
73.
cloud security
74.
communication system security
75.
comprehensive system of economic security
76.
computer security
77.
cooperative security dilemma
78.
cyber security
79.
cyber security education
80.
cyber security exercises
81.
cyber security monitoring
82.
cyber security monitoring in maritime
83.
cyber security strategies
84.
cyber-physical system security
85.
cyber-security
86.
data and information security
87.
data security
88.
development of security cameras
89.
digital security practices
90.
drinking water security
91.
economic security
92.
economic security of enterprise
93.
emotional security
94.
energy security
95.
energy security indicator
96.
Estonian information security standard
97.
graded security
98.
hardware security
99.
hardware security primitive
100.
high level of security
101.
Homeland security
102.
human security
103.
information security
104.
information security and privacy
105.
initial level of security
106.
internal security
107.
international security
108.
investment and innovation security
109.
IPv6 security
110.
IT security
111.
IT security management
112.
job security
113.
long-term security
114.
maritime cyber security
115.
maritime cyber security operations centers
116.
Maritime Security Operations Center (M-SOC)
117.
medium level of security
118.
metadata model for security measures
119.
Middle Eastern security
120.
Mobile security
121.
national cyber security strategy
122.
national security
123.
NATO. Science for Peace and Security Program
124.
network security
125.
network security monitoring
126.
OSCE (Organization for Security and Co-operation in Europe)
127.
passenger’s security
128.
policy-based routing security
129.
political and security cultures
130.
post-quantum security
131.
power system security
132.
quantitative security
133.
regional security
134.
RISC-V Security Verification
135.
Safety and Security in Sea Transportation
136.
safety and security testing
137.
security
138.
security adaptation
139.
security alert prioritization
140.
security analysis
141.
security and justice (AFSJ)
142.
Security and political science
143.
security and privacy
144.
security and privacy in smart grids
145.
Security Assertion
146.
Security Assertion Mining
147.
security closure
148.
Security Coverage
149.
security dataset
150.
security dilemma
151.
Security evaluation
152.
security evaluation instruments
153.
Security Level Evaluation
154.
Security limitations
155.
security log analysis
156.
security management
157.
security model
158.
security monitoring
159.
security notion
160.
security objectives
161.
security of data
162.
security operation center
163.
security operations center
164.
security patterns
165.
security policy
166.
security problem definition
167.
security proof
168.
security protocols
169.
security requirements
170.
security requirements engineering
171.
security research
172.
security risk assessment
173.
security risk management
174.
security risks
175.
security science and technology
176.
security strategies
177.
security systems for military objects
178.
security testing
179.
security training
180.
security verification
181.
security-by-design
182.
social security planning
183.
societal security
184.
software security
185.
software security level
186.
software security subcharacteristics
187.
sufficient level of security
188.
system of economic security
189.
system security
190.
terrorism security
191.
transmission System Security
192.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT