Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
economic security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/228)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69/en
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
Economic security of enterprise and the system of its ensuring
Ianioglo, Alina
;
Põlajeva, Tatjana
;
Parmacli, Dmitri
Scientific Conference Contemporary Issues in Business, Management and Education 2015 : selected papers : 12-13 November 2015, Vilnius, Lithuania
2015
/
p. 1-8 : ill
http://dx.doi.org/10.3846/cibme.2015.05
artikkel kogumikus
3
artikkel ajakirjas
La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69
artikkel ajakirjas
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The essence and phases of the comprehensive system of ensuring the economic security of enterprise
Ianioglo, Alina
;
Põlajeva, Tatjana
International journal of learning and change
2017
/
p. 59-74
https://doi.org/10.1504/IJLC.2017.084223
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
226
1.
comprehensive system of economic security
2.
economic security
3.
economic security of enterprise
4.
system of economic security
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
cloud security
10.
communication system security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security strategies
18.
cyber-physical system security
19.
cyber-security
20.
data and information security
21.
data security
22.
development of security cameras
23.
digital security practices
24.
drinking water security
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
maritime cyber security
47.
maritime cyber security operations centers
48.
Maritime Security Operations Center (M-SOC)
49.
medium level of security
50.
metadata model for security measures
51.
Middle Eastern security
52.
Mobile security
53.
national cyber security strategy
54.
national security
55.
NATO. Science for Peace and Security Program
56.
network security
57.
network security monitoring
58.
OSCE (Organization for Security and Co-operation in Europe)
59.
passenger’s security
60.
policy-based routing security
61.
political and security cultures
62.
post-quantum security
63.
power system security
64.
quantitative security
65.
regional security
66.
RISC-V Security Verification
67.
Safety and Security in Sea Transportation
68.
safety and security testing
69.
security
70.
security adaptation
71.
security alert prioritization
72.
security analysis
73.
security and justice (AFSJ)
74.
Security and political science
75.
security and privacy
76.
security and privacy in smart grids
77.
Security Assertion
78.
Security Assertion Mining
79.
security closure
80.
Security Coverage
81.
security dataset
82.
security dilemma
83.
Security evaluation
84.
security evaluation instruments
85.
Security Level Evaluation
86.
Security limitations
87.
security log analysis
88.
security management
89.
security model
90.
security monitoring
91.
security notion
92.
security objectives
93.
security of data
94.
security of supply
95.
security operation center
96.
security operations center
97.
security patterns
98.
security policy
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security research
105.
security risk assessment
106.
security risk management
107.
security risks
108.
security science and technology
109.
security strategies
110.
security systems for military objects
111.
security testing
112.
security training
113.
security verification
114.
security-by-design
115.
social security planning
116.
societal security
117.
software security
118.
software security level
119.
software security subcharacteristics
120.
sufficient level of security
121.
system security
122.
terrorism security
123.
transmission System Security
124.
voting privacy and security
125.
asymmetric economic integration
126.
combined heat and power economic dispatch (CHPED)
127.
comparative economic development
128.
comparative economic systems
129.
cubic economic load dispatch
130.
development of economic thought
131.
Early Islamic economic thought
132.
economic
133.
economic policy coordination
134.
economic education
135.
economic activity
136.
Economic Allocation
137.
economic analysis
138.
Economic and Monetary Union
139.
economic and social cohesion
140.
economic and social effects
141.
economic benefits
142.
economic complexity
143.
economic conditions
144.
economic convergence
145.
economic cooperation
146.
economic crisis
147.
economic cycle
148.
Economic Development
149.
Economic Development and Growth
150.
economic development policy
151.
economic developmnet
152.
economic dispatch
153.
economic effect
154.
economic efficiency
155.
economic environment
156.
economic feasibility
157.
economic feasibility analysis
158.
economic fluctuations
159.
economic growth
160.
Economic growth and aggregate productivity regional government analysis
161.
economic history
162.
economic history Europe
163.
economic impact
164.
economic indicators
165.
economic insulation thickness
166.
economic integration
167.
economic interests
168.
economic load dispatch
169.
economic load dispatch (ELD)
170.
Economic Management
171.
economic model
172.
economic modeling
173.
economic motives
174.
economic networks
175.
Economic optimization model
176.
economic performance
177.
economic planning
178.
economic policies
179.
economic policy
180.
Economic policy uncertainty
181.
economic populism
182.
economic power dispatch
183.
economic recession
184.
economic recession of 2008-2011
185.
economic reforms
186.
economic regulation
187.
economic regulation assessment
188.
Economic risk
189.
economic sanctions
190.
economic shocks
191.
economic theory
192.
economic transformations
193.
Economic transit
194.
economic transition
195.
environmental and economic losses of the construction project
196.
environmental and economic regulation
197.
European economic integration
198.
European Economic Space
199.
European history of economic thought
200.
fiscal and economic effects
201.
History of Chinese economic thought and philosophy
202.
history of economic thought before 1750
203.
mathematical models for economic problems
204.
R11 - regional economic activity
205.
regional economic integration
206.
Silk Road Economic Belt
207.
social and economic impacts
208.
social-economic analysis
209.
Socio-economic context
210.
socio-economic development
211.
socio-economic factors
212.
socio-economic impacts
213.
socio-economic risks
214.
socio-economic status
215.
socio-economic system change
216.
sustainable economic growth
217.
techno-economic
218.
Techno-economic analysis
219.
techno-economic assessment
220.
Techno-economic modelling
221.
techno-economic paradigm shifts
222.
techno-economic paradigms
223.
The organisation for economic cooperation and development (OECD)
224.
theory of economic development
225.
unreported economic activity
226.
wear and economic feasibility map
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT