Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of supply (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/192)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Future outlook and current situation for security of gas supply in Eastern Baltic region
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
World Academy of Science, Engineering and Technology. International journal of social, human science and engineering
2013
/
p. 1287-1294 : ill
journal article
2
journal article
Improving security of gas supply in Eastern Baltic region : LNG terminal alternatives
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
International journal of energy
2014
/
p. 1-7
journal article
3
book article
Security of gas supply in Eastern Baltic region : current situation and future outlook
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
Recent Advances in Energy Planning and Environment : proceedings of the 7th WSEAS International Conference on Energy Planning, Energy Saving, Environmental Education (EPESE '13), Paris, France, October 29-31, 2013
2013
/
p. 71-80 : ill
book article
4
book article
The Eastern Baltic LNG terminal as a prospect to improve security of regional gas supply
Kõrbe Kaare, Kati
;
Koppel, Ott
;
Leppiman, Ando
Recent Advances in Environment, Energy, Ecosystems and Development : proceedings of the 2013 International Conference on Environment, Energy, Ecosystems and Development (EEEAD 2013), Venice, Italy, September 28-30, 2013
2013
/
p. 158-164
book article
5
book article
Wind park and transmission network cooperation considering Grid Code requirements
Kilter, Jako
;
Dubbelman, Edgar
;
Palu, Ivo
;
Niitsoo, Jaan
Electrical and Control Technologies : proceedings of the the 7th International Conference on Electrical and Control Technologies ECT-2012
2012
/
p. 183-188 : ill
https://www.researchgate.net/publication/290252818_Wind_park_and_transmission_network_cooperation_considering_Grid_Code_requirements
book article
Number of records 5, displaying
1 - 5
keyword
190
1.
security of supply
2.
automated supply air temperature (ASAT)
3.
auxiliary power supply
4.
carbon-neutral energy supply
5.
DC power supply
6.
demand & supply chain management
7.
digital supply chain
8.
diversified supply options
9.
electricity supply industry deregulation
10.
fashion supply chains
11.
global supply chains
12.
green supply chain management
13.
grid supply
14.
grid-connected power supply
15.
Labour supply
16.
legume supply chain
17.
limitation of supply
18.
local power supply system
19.
Logistics and supply chain management
20.
maitime supply chains
21.
metal stirring combined DC and AC supply
22.
money supply
23.
obligation to supply
24.
off-grid hybrid power supply
25.
power supply
26.
quality of supply
27.
refusal to supply
28.
Renewable electricity supply
29.
road construction supply chain
30.
service supply chain
31.
smart supply chains
32.
supply
33.
supply and demand
34.
supply and use tables
35.
supply chain
36.
supply chain (SC)
37.
supply chain competences
38.
supply chain curricula
39.
supply chain engineering
40.
supply chain integration
41.
supply chain management
42.
supply chain model framework
43.
supply chain operations reference (SCOR)
44.
supply chain operations reference (SCOR) model
45.
supply chain planning
46.
supply chain risk
47.
supply chain risk management
48.
supply chain simulation
49.
supply chain skills
50.
supply chain traceability
51.
supply chains
52.
supply networks
53.
supply routes for natural gas
54.
supply shock
55.
supply systems
56.
supply voltage quality
57.
sustainable supply chain management
58.
Sustainable supply chains management
59.
sustainalble supply chain management
60.
switch mode power supply
61.
switchedmode power supply
62.
switched-mode power supply
63.
teaching supply chain management
64.
termination of supply
65.
transparent supply chain
66.
uninterruptible power supply (UPS)
67.
welding power supply
68.
ad-hoc sensor networks security
69.
Automatic Security Verification
70.
Blockchain security
71.
cache security
72.
cloud security
73.
communication system security
74.
comprehensive system of economic security
75.
computer security
76.
cooperative security dilemma
77.
cyber security
78.
cyber security education
79.
cyber security exercises
80.
cyber security monitoring
81.
cyber security strategies
82.
cyber-physical system security
83.
cyber-security
84.
data and information security
85.
data security
86.
development of security cameras
87.
digital security practices
88.
drinking water security
89.
economic security
90.
economic security of enterprise
91.
emotional security
92.
energy security
93.
energy security indicator
94.
Estonian information security standard
95.
graded security
96.
hardware security
97.
hardware security primitive
98.
high level of security
99.
Homeland security
100.
human security
101.
information security
102.
information security and privacy
103.
initial level of security
104.
internal security
105.
international security
106.
investment and innovation security
107.
IPv6 security
108.
IT security
109.
IT security management
110.
job security
111.
long-term security
112.
maritime cyber security
113.
maritime cyber security operations centers
114.
Maritime Security Operations Center (M-SOC)
115.
medium level of security
116.
metadata model for security measures
117.
Middle Eastern security
118.
Mobile security
119.
national cyber security strategy
120.
national security
121.
NATO. Science for Peace and Security Program
122.
network security
123.
network security monitoring
124.
OSCE (Organization for Security and Co-operation in Europe)
125.
passenger’s security
126.
policy-based routing security
127.
political and security cultures
128.
post-quantum security
129.
power system security
130.
quantitative security
131.
regional security
132.
RISC-V Security Verification
133.
Safety and Security in Sea Transportation
134.
safety and security testing
135.
security
136.
security adaptation
137.
security alert prioritization
138.
security analysis
139.
security and justice (AFSJ)
140.
Security and political science
141.
security and privacy
142.
security and privacy in smart grids
143.
Security Assertion
144.
Security Assertion Mining
145.
security closure
146.
Security Coverage
147.
security dataset
148.
security dilemma
149.
Security evaluation
150.
security evaluation instruments
151.
Security Level Evaluation
152.
Security limitations
153.
security log analysis
154.
security management
155.
security model
156.
security monitoring
157.
security notion
158.
security objectives
159.
security of data
160.
security operation center
161.
security operations center
162.
security patterns
163.
security policy
164.
security problem definition
165.
security proof
166.
security protocols
167.
security requirements
168.
security requirements engineering
169.
security research
170.
security risk assessment
171.
security risk management
172.
security risks
173.
security science and technology
174.
security strategies
175.
security systems for military objects
176.
security testing
177.
security training
178.
security verification
179.
security-by-design
180.
social security planning
181.
societal security
182.
software security
183.
software security level
184.
software security subcharacteristics
185.
sufficient level of security
186.
system of economic security
187.
system security
188.
terrorism security
189.
transmission System Security
190.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT