Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Security and political science (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(4/223)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
PROMISE – PROMoting AI’s Safe usage for Elections
2025
https://link.springer.com/book/9783031898525#bibliographic-information
book
Number of records 1, displaying
1 - 1
keyword
213
1.
Security and political science
2.
political and security cultures
3.
political science
4.
NATO. Science for Peace and Security Program
5.
security science and technology
6.
constitutional political economy
7.
critical political economy
8.
Estonian political parties
9.
international relations and international political economy
10.
local political decision-making behaviour
11.
political and ideological conflict
12.
political and judicial oversight
13.
political communities
14.
political community
15.
political conflict
16.
political crisis
17.
political culture
18.
political cultures
19.
political debates
20.
political decision-making
21.
political ecology
22.
political economy
23.
political extremism
24.
political ideology
25.
political integration
26.
political leaders
27.
political leadership
28.
political methodology
29.
political orientation
30.
political participation
31.
political regime
32.
political robustness
33.
political trilemma
34.
socio‐political implications
35.
ad-hoc sensor networks security
36.
Automatic Security Verification
37.
Blockchain security
38.
cache security
39.
communication system security
40.
comprehensive system of economic security
41.
computer security
42.
cooperative security dilemma
43.
cyber security
44.
cyber security education
45.
cyber security exercises
46.
cyber security monitoring
47.
cyber security strategies
48.
cyber-security
49.
data and information security
50.
data security
51.
development of security cameras
52.
digital security practices
53.
drinking water security
54.
economic security
55.
economic security of enterprise
56.
emotional security
57.
energy security
58.
energy security indicator
59.
Estonian information security standard
60.
graded security
61.
hardware security
62.
hardware security primitive
63.
high level of security
64.
Homeland security
65.
human security
66.
information security
67.
information security and privacy
68.
initial level of security
69.
internal security
70.
international security
71.
investment and innovation security
72.
IPv6 security
73.
IT security
74.
IT security management
75.
job security
76.
long-term security
77.
maritime cyber security
78.
maritime cyber security operations centers
79.
Maritime Security Operations Center (M-SOC)
80.
medium level of security
81.
metadata model for security measures
82.
Middle Eastern security
83.
Mobile security
84.
national cyber security strategy
85.
national security
86.
network security
87.
network security monitoring
88.
OSCE (Organization for Security and Co-operation in Europe)
89.
passenger’s security
90.
policy-based routing security
91.
post-quantum security
92.
power system security
93.
quantitative security
94.
regional security
95.
RISC-V Security Verification
96.
Safety and Security in Sea Transportation
97.
safety and security testing
98.
security
99.
security adaptation
100.
security alert prioritization
101.
security analysis
102.
security and justice (AFSJ)
103.
security and privacy
104.
security and privacy in smart grids
105.
Security Assertion Mining
106.
security closure
107.
Security Coverage
108.
security dataset
109.
security dilemma
110.
Security evaluation
111.
security evaluation instruments
112.
Security limitations
113.
security log analysis
114.
security management
115.
security model
116.
security monitoring
117.
security notion
118.
security objectives
119.
security of data
120.
security of supply
121.
security operation center
122.
security operations center
123.
security patterns
124.
security policy
125.
security problem definition
126.
security proof
127.
security protocols
128.
security requirements
129.
security requirements engineering
130.
security research
131.
security risk assessment
132.
security risk management
133.
security risks
134.
security strategies
135.
security systems for military objects
136.
security testing
137.
security training
138.
security verification
139.
security-by-design
140.
social security planning
141.
societal security
142.
software security
143.
software security level
144.
software security subcharacteristics
145.
sufficient level of security
146.
system of economic security
147.
system security
148.
terrorism security
149.
transmission System Security
150.
voting privacy and security
151.
applied science
152.
big data science
153.
chemistry and philosophy of science
154.
citizen science
155.
citizen science hub
156.
classical exact science
157.
cognitive science
158.
computational social science
159.
computer science
160.
computer science basics
161.
computer science education
162.
data science
163.
data-science
164.
decision science
165.
design science
166.
design science research
167.
design-science
168.
energy science and technology
169.
engineering pedagogy science
170.
environmental science
171.
ethics of science
172.
exact science
173.
food science
174.
forensic science
175.
logic in computer science
176.
logic of science
177.
materials science
178.
non-classical exact science
179.
philosophy of science
180.
physics and philosophy of science
181.
planetary science
182.
popular science literature
183.
post normal science
184.
post-normal science
185.
Q science
186.
science
187.
science advisors
188.
science and arts
189.
science and technology libraries
190.
science and technology parks
191.
science fiction
192.
science gateway
193.
science integration
194.
science mapping
195.
science policy
196.
science technology and innovation
197.
science technology innovation
198.
Science, Technology and Innovation Policy
199.
science-based industries
200.
science-driven models
201.
science-policy-society interface
202.
Social Science
203.
social science methodology
204.
sustainability science
205.
Thomson Reuters Web of Science
206.
transdisciplinary science
207.
values in science
208.
Web of Science
209.
wood science and technology
210.
World Academy of Art and Science (WAAS)
211.
ȹ-science
212.
φ-science
213.
ϕ-science
subject term
7
1.
European Consortium for Political Research (ECPR)
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
4.
Estonian Summer School on Computer and Systems Science, 2023
5.
Norwegian University of Science and Technology
6.
The European Federation of Food Science and Technology (EFFoST)
7.
Web of Science
TalTech department
2
1.
Department of Software Science
2.
School of Science
author
1
1.
Department of Software Science, Tallinn University of Technology
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT