Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
regional security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/180)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Association of Southeast Asian Nations (ASEAN)
Valuch, Josef
;
Hamulak, Ondrej
International conflict and security law : a research handbook
2022
/
p. 595-608
https://doi.org/10.1007/978-94-6265-515-7_27
book article
2
book article
The Islamic State, clash of civilizations and their impact on the development of contemporary international relations
Mölder, Holger
Cultural crossroads in the Middle East : the historical, cultural and political legacy of intercultural dialogue and conflict from the ancient Near East to the present day
2020
/
p. 314-345
https://www.ester.ee/record=b5259885*est
book article
Number of records 2, displaying
1 - 2
keyword
177
1.
regional security
2.
Aruküla regional stage
3.
Burtnieki Regional Stage
4.
Cross-regional expansion
5.
Ecological Regional Ocean Model (ERGOM)
6.
Economic growth and aggregate productivity regional government analysis
7.
gross regional product
8.
Haljala Regional Stage
9.
Kunda Regional Stage
10.
melanoma loco-regional treatment
11.
Porkuni Regional Stage
12.
R11 - regional economic activity
13.
regional adaptation
14.
regional aircraft
15.
regional airport
16.
regional airports
17.
Regional and local government policy
18.
regional aviation
19.
regional branding
20.
regional chemotherapy
21.
regional cooperation
22.
regional co-operation
23.
regional courts
24.
regional courts of justice
25.
regional development
26.
regional economic integration
27.
regional economies
28.
regional extinctions
29.
regional geoid
30.
regional geoid modelling
31.
Regional governments
32.
regional higher education institutions
33.
regional innovation
34.
regional innovation networks
35.
regional innovation strategies on smart specialization (RIS3)
36.
regional innovation systems
37.
regional institutions
38.
Regional integrated energy system (RIES)
39.
regional integration
40.
regional learning
41.
regional management
42.
regional modelling
43.
Regional oceanography
44.
regional organisations
45.
regional policy
46.
regional sediment balance
47.
regional specialization
48.
regional stage
49.
regional stratigraphy
50.
regional terminals
51.
regional visual read
52.
sustainable regional development
53.
Vojvyv Regional Stage
54.
ad-hoc sensor networks security
55.
Automatic Security Verification
56.
Blockchain security
57.
cache security
58.
cloud security
59.
communication system security
60.
comprehensive system of economic security
61.
computer security
62.
cooperative security dilemma
63.
cyber security
64.
cyber security education
65.
cyber security exercises
66.
cyber security monitoring
67.
cyber security monitoring in maritime
68.
cyber security strategies
69.
cyber-physical system security
70.
cyber-security
71.
data and information security
72.
data security
73.
development of security cameras
74.
digital security practices
75.
drinking water security
76.
economic security
77.
economic security of enterprise
78.
emotional security
79.
energy security
80.
energy security indicator
81.
Estonian information security standard
82.
graded security
83.
hardware security
84.
hardware security primitive
85.
high level of security
86.
Homeland security
87.
human security
88.
information security
89.
information security and privacy
90.
initial level of security
91.
internal security
92.
international security
93.
investment and innovation security
94.
IPv6 security
95.
IT security
96.
IT security management
97.
job security
98.
long-term security
99.
maritime cyber security
100.
maritime cyber security operations centers
101.
Maritime Security Operations Center (M-SOC)
102.
medium level of security
103.
metadata model for security measures
104.
Middle Eastern security
105.
Mobile security
106.
national cyber security strategy
107.
national security
108.
NATO. Science for Peace and Security Program
109.
network security
110.
network security monitoring
111.
OSCE (Organization for Security and Co-operation in Europe)
112.
passenger’s security
113.
policy-based routing security
114.
political and security cultures
115.
post-quantum security
116.
power system security
117.
quantitative security
118.
RISC-V Security Verification
119.
Safety and Security in Sea Transportation
120.
safety and security testing
121.
security
122.
security adaptation
123.
security alert prioritization
124.
security analysis
125.
security and justice (AFSJ)
126.
Security and political science
127.
security and privacy
128.
security and privacy in smart grids
129.
Security Assertion
130.
Security Assertion Mining
131.
security closure
132.
Security Coverage
133.
security dataset
134.
security dilemma
135.
Security evaluation
136.
security evaluation instruments
137.
Security Level Evaluation
138.
Security limitations
139.
security log analysis
140.
security management
141.
security model
142.
security monitoring
143.
security notion
144.
security objectives
145.
security of data
146.
security of supply
147.
security operation center
148.
security operations center
149.
security patterns
150.
security policy
151.
security problem definition
152.
security proof
153.
security protocols
154.
security requirements
155.
security requirements engineering
156.
security research
157.
security risk assessment
158.
security risk management
159.
security risks
160.
security science and technology
161.
security strategies
162.
security systems for military objects
163.
security testing
164.
security training
165.
security verification
166.
security-by-design
167.
social security planning
168.
societal security
169.
software security
170.
software security level
171.
software security subcharacteristics
172.
sufficient level of security
173.
system of economic security
174.
system security
175.
terrorism security
176.
transmission System Security
177.
voting privacy and security
subject term
3
1.
European Regional Development Fund
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT