Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/163)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
The prospects of strategic imagination in explaining international security challenges
Mölder, Holger
Quality & Quantity : International Journal of Methodology
2023
/
p. 55-76
https://doi.org/10.1007/s11135-022-01386-w
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
161
1.
cyber security strategies
2.
security strategies
3.
airport strategies
4.
bias mitigation strategies
5.
climate strategies
6.
co-design strategies
7.
collaboration strategies
8.
control optimization strategies
9.
coping strategies
10.
course development strategies
11.
cultural adjustment strategies
12.
cultural tourism strategies
13.
digital strategies
14.
Educational strategies
15.
e-Government policies and strategies
16.
energy management strategies (EMS)
17.
enterprise strategies
18.
EoL strategies
19.
EU policies and strategies
20.
European firefighting strategies
21.
fixation strategies
22.
graph and tree search strategies
23.
HVAC control strategies
24.
hybrid strategies
25.
innovation in processing strategies
26.
management strategies
27.
marketing strategies
28.
mitigation strategies
29.
mitigation strategies of UHI effect
30.
passive design strategies
31.
portfolio of strategies
32.
questioning strategies
33.
regional innovation strategies on smart specialization (RIS3)
34.
research strategies
35.
smart specialization strategies (S3)
36.
strategies
37.
strategies and concepts of bioinspired designs
38.
strategies for human resource and local policies
39.
strategies of inquiry
40.
suboptimal feedback strategies
41.
sub-optimal feedback strategies
42.
synthesis strategies
43.
teaching strategies
44.
ad-hoc sensor networks security
45.
Automatic Security Verification
46.
Blockchain security
47.
cache security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber-security
57.
data and information security
58.
data security
59.
development of security cameras
60.
digital security practices
61.
drinking water security
62.
economic security
63.
economic security of enterprise
64.
emotional security
65.
energy security
66.
energy security indicator
67.
Estonian information security standard
68.
graded security
69.
hardware security
70.
hardware security primitive
71.
high level of security
72.
Homeland security
73.
human security
74.
information security
75.
information security and privacy
76.
initial level of security
77.
internal security
78.
international security
79.
investment and innovation security
80.
IPv6 security
81.
IT security
82.
IT security management
83.
job security
84.
long-term security
85.
maritime cyber security
86.
maritime cyber security operations centers
87.
Maritime Security Operations Center (M-SOC)
88.
medium level of security
89.
metadata model for security measures
90.
Middle Eastern security
91.
Mobile security
92.
national cyber security strategy
93.
national security
94.
NATO. Science for Peace and Security Program
95.
network security
96.
network security monitoring
97.
OSCE (Organization for Security and Co-operation in Europe)
98.
passenger’s security
99.
policy-based routing security
100.
political and security cultures
101.
post-quantum security
102.
power system security
103.
quantitative security
104.
regional security
105.
RISC-V Security Verification
106.
Safety and Security in Sea Transportation
107.
safety and security testing
108.
security
109.
security adaptation
110.
security alert prioritization
111.
security analysis
112.
security and justice (AFSJ)
113.
Security and political science
114.
security and privacy
115.
security and privacy in smart grids
116.
Security Assertion Mining
117.
security closure
118.
Security Coverage
119.
security dataset
120.
security dilemma
121.
Security evaluation
122.
security evaluation instruments
123.
Security limitations
124.
security log analysis
125.
security management
126.
security model
127.
security monitoring
128.
security notion
129.
security objectives
130.
security of data
131.
security of supply
132.
security operation center
133.
security operations center
134.
security patterns
135.
security policy
136.
security problem definition
137.
security proof
138.
security protocols
139.
security requirements
140.
security requirements engineering
141.
security research
142.
security risk assessment
143.
security risk management
144.
security risks
145.
security science and technology
146.
security systems for military objects
147.
security testing
148.
security training
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
software security
154.
software security level
155.
software security subcharacteristics
156.
sufficient level of security
157.
system of economic security
158.
system security
159.
terrorism security
160.
transmission System Security
161.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT