Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
human security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/235)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Responsibility to protect and human security: doctrines destroying or strengthening the sovereignty?
Uusitalo, Jenna
International and comparative law review
2018
/
p. 89–103
https://doi.org/10.2478/iclr-2018-0021
artikkel ajakirjas
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
233
1.
human security
2.
human factor of cybersecurity
3.
human factors in cybersecurity
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
Maritime Security Operations Center (M-SOC)
46.
medium level of security
47.
metadata model for security measures
48.
Middle Eastern security
49.
Mobile security
50.
national cyber security strategy
51.
national security
52.
NATO. Science for Peace and Security Program
53.
network security
54.
network security monitoring
55.
OSCE (Organization for Security and Co-operation in Europe)
56.
passenger’s security
57.
policy-based routing security
58.
political and security cultures
59.
post-quantum security
60.
power system security
61.
quantitative security
62.
regional security
63.
RISC-V Security Verification
64.
Safety and Security in Sea Transportation
65.
safety and security testing
66.
security
67.
security adaptation
68.
security alert prioritization
69.
security analysis
70.
security and justice (AFSJ)
71.
Security and political science
72.
security and privacy
73.
security and privacy in smart grids
74.
Security Assertion Mining
75.
security closure
76.
Security Coverage
77.
security dataset
78.
security dilemma
79.
Security evaluation
80.
security evaluation instruments
81.
Security limitations
82.
security log analysis
83.
security management
84.
security model
85.
security monitoring
86.
security notion
87.
security objectives
88.
security of data
89.
security of supply
90.
security operation center
91.
security operations center
92.
security patterns
93.
security policy
94.
security problem definition
95.
security proof
96.
security protocols
97.
security requirements
98.
security requirements engineering
99.
security risk assessment
100.
security risk management
101.
security risks
102.
security science and technology
103.
security strategies
104.
security systems for military objects
105.
security testing
106.
security training
107.
security verification
108.
security-by-design
109.
social security planning
110.
societal security
111.
software security
112.
software security level
113.
software security subcharacteristics
114.
sufficient level of security
115.
system of economic security
116.
system security
117.
terrorism security
118.
transmission System Security
119.
voting privacy and security
120.
basic human values
121.
business and human rights
122.
design methodology and human-centred design
123.
Digital/Human configurations
124.
environmental and human safety index
125.
European Convention on Human Rights
126.
European Court of Human Rights
127.
fundamental human rights
128.
generations of human rights
129.
genome (human)
130.
genome, human
131.
history of human rights
132.
human
133.
human activity recognition
134.
human activity recognition (HAR)
135.
Human agency
136.
human augmentation
137.
human behavior
138.
human behavior modeling
139.
human behaviour
140.
Human brands
141.
human capital
142.
human capital accumulation
143.
human capital reporting
144.
human characteristics
145.
human cognition
146.
human computer interaction
147.
human computer interaction (HCI)
148.
Human Cytomegalovirus (CMV)
149.
human development
150.
human dignity
151.
human disease
152.
human EEG
153.
human element
154.
human emotional and physiological states
155.
human emotions
156.
human error
157.
human experience
158.
human factor
159.
human factor (HF)
160.
human factors
161.
human factors in vehicular system
162.
human gait
163.
human gait modeling
164.
human gait plant
165.
human genome
166.
human gut microbiome
167.
human gut microbiota
168.
human health
169.
human impact
170.
human influence
171.
human intervention studies
172.
human life expectancy
173.
human limb
174.
human machine interaction
175.
human machine systems
176.
human mobility
177.
human motion analysis
178.
human motor functions
179.
human movement patterns
180.
human neural progenitor cells
181.
human ovarian follicle
182.
human oversight
183.
human pancreatic lipase
184.
human papilloma virus
185.
human path rehabilitation
186.
human perception
187.
human performance factors
188.
human population size
189.
human privacy
190.
human readable
191.
human resource and Strategy Europe 2020
192.
human resource competitiveness
193.
human resource development
194.
human resource management
195.
human resources
196.
human review
197.
human rights
198.
human rights of minors
199.
human robot collaboration (HRC)
200.
human robot interaction
201.
human safety
202.
human shortcomings
203.
human skeletal remains
204.
human social presence
205.
human stefin B
206.
human thermal plume
207.
Human-brand based marketing
208.
Human-centered
209.
human-centered design
210.
Human-centered planning
211.
human-centred learning
212.
human-centredness
213.
human-centric design
214.
human-computer interaction
215.
human–computer interaction
216.
Human-Computer Interaction (HCI)
217.
human-computer trust
218.
human-landscape relationship
219.
human-machine interaction
220.
human-machine interactions
221.
human-machine interface
222.
human-machine system
223.
human-readable
224.
human-robot
225.
human-robot collaboration
226.
human-robot interaction
227.
human–robot interaction
228.
human-robot interaction (HRI)
229.
international human rights law
230.
social and human capital
231.
standardized "human" prototype
232.
strategic human resource management
233.
strategies for human resource and local policies
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT