Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of supply (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/185)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Future outlook and current situation for security of gas supply in Eastern Baltic region
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
World Academy of Science, Engineering and Technology. International journal of social, human science and engineering
2013
/
p. 1287-1294 : ill
journal article
2
journal article
Improving security of gas supply in Eastern Baltic region : LNG terminal alternatives
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
International journal of energy
2014
/
p. 1-7
journal article
3
book article
Security of gas supply in Eastern Baltic region : current situation and future outlook
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
Recent Advances in Energy Planning and Environment : proceedings of the 7th WSEAS International Conference on Energy Planning, Energy Saving, Environmental Education (EPESE '13), Paris, France, October 29-31, 2013
2013
/
p. 71-80 : ill
book article
4
book article
The Eastern Baltic LNG terminal as a prospect to improve security of regional gas supply
Kõrbe Kaare, Kati
;
Koppel, Ott
;
Leppiman, Ando
Recent Advances in Environment, Energy, Ecosystems and Development : proceedings of the 2013 International Conference on Environment, Energy, Ecosystems and Development (EEEAD 2013), Venice, Italy, September 28-30, 2013
2013
/
p. 158-164
book article
5
book article
Wind park and transmission network cooperation considering Grid Code requirements
Kilter, Jako
;
Dubbelman, Edgar
;
Palu, Ivo
;
Niitsoo, Jaan
Electrical and Control Technologies : proceedings of the the 7th International Conference on Electrical and Control Technologies ECT-2012
2012
/
p. 183-188 : ill
https://www.researchgate.net/publication/290252818_Wind_park_and_transmission_network_cooperation_considering_Grid_Code_requirements
book article
Number of records 5, displaying
1 - 5
keyword
183
1.
security of supply
2.
automated supply air temperature (ASAT)
3.
auxiliary power supply
4.
carbon-neutral energy supply
5.
DC power supply
6.
demand & supply chain management
7.
digital supply chain
8.
diversified supply options
9.
electricity supply industry deregulation
10.
fashion supply chains
11.
global supply chains
12.
green supply chain management
13.
grid supply
14.
grid-connected power supply
15.
Labour supply
16.
legume supply chain
17.
limitation of supply
18.
local power supply system
19.
Logistics and supply chain management
20.
maitime supply chains
21.
metal stirring combined DC and AC supply
22.
money supply
23.
obligation to supply
24.
off-grid hybrid power supply
25.
power supply
26.
quality of supply
27.
refusal to supply
28.
Renewable electricity supply
29.
road construction supply chain
30.
service supply chain
31.
smart supply chains
32.
supply
33.
supply and demand
34.
supply and use tables
35.
supply chain
36.
supply chain (SC)
37.
supply chain competences
38.
supply chain curricula
39.
supply chain engineering
40.
supply chain integration
41.
supply chain management
42.
supply chain model framework
43.
supply chain operations reference (SCOR)
44.
supply chain operations reference (SCOR) model
45.
supply chain planning
46.
supply chain risk
47.
supply chain risk management
48.
supply chain simulation
49.
supply chain skills
50.
supply chain traceability
51.
supply chains
52.
supply networks
53.
supply routes for natural gas
54.
supply shock
55.
supply systems
56.
supply voltage quality
57.
sustainable supply chain management
58.
Sustainable supply chains management
59.
sustainalble supply chain management
60.
switch mode power supply
61.
switchedmode power supply
62.
switched-mode power supply
63.
teaching supply chain management
64.
termination of supply
65.
transparent supply chain
66.
uninterruptible power supply (UPS)
67.
welding power supply
68.
ad-hoc sensor networks security
69.
Automatic Security Verification
70.
Blockchain security
71.
cache security
72.
communication system security
73.
comprehensive system of economic security
74.
computer security
75.
cooperative security dilemma
76.
cyber security
77.
cyber security education
78.
cyber security exercises
79.
cyber security monitoring
80.
cyber security strategies
81.
cyber-security
82.
data and information security
83.
data security
84.
development of security cameras
85.
digital security practices
86.
drinking water security
87.
economic security
88.
economic security of enterprise
89.
emotional security
90.
energy security
91.
energy security indicator
92.
Estonian information security standard
93.
graded security
94.
hardware security
95.
hardware security primitive
96.
high level of security
97.
Homeland security
98.
human security
99.
information security
100.
information security and privacy
101.
initial level of security
102.
internal security
103.
international security
104.
investment and innovation security
105.
IPv6 security
106.
IT security
107.
IT security management
108.
job security
109.
long-term security
110.
Maritime Security Operations Center (M-SOC)
111.
medium level of security
112.
metadata model for security measures
113.
Middle Eastern security
114.
Mobile security
115.
national cyber security strategy
116.
national security
117.
NATO. Science for Peace and Security Program
118.
network security
119.
network security monitoring
120.
OSCE (Organization for Security and Co-operation in Europe)
121.
passenger’s security
122.
policy-based routing security
123.
political and security cultures
124.
post-quantum security
125.
power system security
126.
quantitative security
127.
regional security
128.
RISC-V Security Verification
129.
Safety and Security in Sea Transportation
130.
safety and security testing
131.
security
132.
security adaptation
133.
security alert prioritization
134.
security analysis
135.
security and justice (AFSJ)
136.
Security and political science
137.
security and privacy
138.
security and privacy in smart grids
139.
Security Assertion Mining
140.
security closure
141.
Security Coverage
142.
security dataset
143.
security dilemma
144.
Security evaluation
145.
security evaluation instruments
146.
Security limitations
147.
security log analysis
148.
security management
149.
security model
150.
security monitoring
151.
security notion
152.
security objectives
153.
security of data
154.
security operation center
155.
security operations center
156.
security patterns
157.
security policy
158.
security problem definition
159.
security proof
160.
security protocols
161.
security requirements
162.
security requirements engineering
163.
security risk assessment
164.
security risk management
165.
security risks
166.
security science and technology
167.
security strategies
168.
security systems for military objects
169.
security testing
170.
security training
171.
security verification
172.
security-by-design
173.
social security planning
174.
societal security
175.
software security
176.
software security level
177.
software security subcharacteristics
178.
sufficient level of security
179.
system of economic security
180.
system security
181.
terrorism security
182.
transmission System Security
183.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT