Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
regional security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/180)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Association of Southeast Asian Nations (ASEAN)
Valuch, Josef
;
Hamulak, Ondrej
International conflict and security law : a research handbook
2022
/
p. 595-608
https://doi.org/10.1007/978-94-6265-515-7_27
artikkel kogumikus
2
artikkel kogumikus
The Islamic State, clash of civilizations and their impact on the development of contemporary international relations
Mölder, Holger
Cultural crossroads in the Middle East : the historical, cultural and political legacy of intercultural dialogue and conflict from the ancient Near East to the present day
2020
/
p. 314-345
https://www.ester.ee/record=b5259885*est
artikkel kogumikus
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
177
1.
regional security
2.
Aruküla regional stage
3.
Burtnieki Regional Stage
4.
Cross-regional expansion
5.
Ecological Regional Ocean Model (ERGOM)
6.
Economic growth and aggregate productivity regional government analysis
7.
gross regional product
8.
Haljala Regional Stage
9.
Kunda Regional Stage
10.
melanoma loco-regional treatment
11.
Porkuni Regional Stage
12.
R11 - regional economic activity
13.
regional adaptation
14.
regional aircraft
15.
regional airport
16.
regional airports
17.
Regional and local government policy
18.
regional aviation
19.
regional branding
20.
regional chemotherapy
21.
regional cooperation
22.
regional co-operation
23.
regional courts
24.
regional courts of justice
25.
regional development
26.
regional economic integration
27.
regional economies
28.
regional extinctions
29.
regional geoid
30.
regional geoid modelling
31.
Regional governments
32.
regional higher education institutions
33.
regional innovation
34.
regional innovation networks
35.
regional innovation strategies on smart specialization (RIS3)
36.
regional innovation systems
37.
regional institutions
38.
Regional integrated energy system (RIES)
39.
regional integration
40.
regional learning
41.
regional management
42.
regional modelling
43.
Regional oceanography
44.
regional organisations
45.
regional policy
46.
regional sediment balance
47.
regional specialization
48.
regional stage
49.
regional stratigraphy
50.
regional terminals
51.
regional visual read
52.
sustainable regional development
53.
Vojvyv Regional Stage
54.
ad-hoc sensor networks security
55.
Automatic Security Verification
56.
Blockchain security
57.
cache security
58.
cloud security
59.
communication system security
60.
comprehensive system of economic security
61.
computer security
62.
cooperative security dilemma
63.
cyber security
64.
cyber security education
65.
cyber security exercises
66.
cyber security monitoring
67.
cyber security monitoring in maritime
68.
cyber security strategies
69.
cyber-physical system security
70.
cyber-security
71.
data and information security
72.
data security
73.
development of security cameras
74.
digital security practices
75.
drinking water security
76.
economic security
77.
economic security of enterprise
78.
emotional security
79.
energy security
80.
energy security indicator
81.
Estonian information security standard
82.
graded security
83.
hardware security
84.
hardware security primitive
85.
high level of security
86.
Homeland security
87.
human security
88.
information security
89.
information security and privacy
90.
initial level of security
91.
internal security
92.
international security
93.
investment and innovation security
94.
IPv6 security
95.
IT security
96.
IT security management
97.
job security
98.
long-term security
99.
maritime cyber security
100.
maritime cyber security operations centers
101.
Maritime Security Operations Center (M-SOC)
102.
medium level of security
103.
metadata model for security measures
104.
Middle Eastern security
105.
Mobile security
106.
national cyber security strategy
107.
national security
108.
NATO. Science for Peace and Security Program
109.
network security
110.
network security monitoring
111.
OSCE (Organization for Security and Co-operation in Europe)
112.
passenger’s security
113.
policy-based routing security
114.
political and security cultures
115.
post-quantum security
116.
power system security
117.
quantitative security
118.
RISC-V Security Verification
119.
Safety and Security in Sea Transportation
120.
safety and security testing
121.
security
122.
security adaptation
123.
security alert prioritization
124.
security analysis
125.
security and justice (AFSJ)
126.
Security and political science
127.
security and privacy
128.
security and privacy in smart grids
129.
Security Assertion
130.
Security Assertion Mining
131.
security closure
132.
Security Coverage
133.
security dataset
134.
security dilemma
135.
Security evaluation
136.
security evaluation instruments
137.
Security Level Evaluation
138.
Security limitations
139.
security log analysis
140.
security management
141.
security model
142.
security monitoring
143.
security notion
144.
security objectives
145.
security of data
146.
security of supply
147.
security operation center
148.
security operations center
149.
security patterns
150.
security policy
151.
security problem definition
152.
security proof
153.
security protocols
154.
security requirements
155.
security requirements engineering
156.
security research
157.
security risk assessment
158.
security risk management
159.
security risks
160.
security science and technology
161.
security strategies
162.
security systems for military objects
163.
security testing
164.
security training
165.
security verification
166.
security-by-design
167.
social security planning
168.
societal security
169.
software security
170.
software security level
171.
software security subcharacteristics
172.
sufficient level of security
173.
system of economic security
174.
system security
175.
terrorism security
176.
transmission System Security
177.
voting privacy and security
märksõna
3
1.
European Regional Development Fund
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT