Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security strategies (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/163)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The prospects of strategic imagination in explaining international security challenges
Mölder, Holger
Quality & Quantity : International Journal of Methodology
2023
/
p. 55-76
https://doi.org/10.1007/s11135-022-01386-w
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
161
1.
cyber security strategies
2.
security strategies
3.
airport strategies
4.
bias mitigation strategies
5.
climate strategies
6.
co-design strategies
7.
collaboration strategies
8.
control optimization strategies
9.
coping strategies
10.
course development strategies
11.
cultural adjustment strategies
12.
cultural tourism strategies
13.
digital strategies
14.
Educational strategies
15.
e-Government policies and strategies
16.
energy management strategies (EMS)
17.
enterprise strategies
18.
EoL strategies
19.
EU policies and strategies
20.
European firefighting strategies
21.
fixation strategies
22.
graph and tree search strategies
23.
HVAC control strategies
24.
hybrid strategies
25.
innovation in processing strategies
26.
management strategies
27.
marketing strategies
28.
mitigation strategies
29.
mitigation strategies of UHI effect
30.
passive design strategies
31.
portfolio of strategies
32.
questioning strategies
33.
regional innovation strategies on smart specialization (RIS3)
34.
research strategies
35.
smart specialization strategies (S3)
36.
strategies
37.
strategies and concepts of bioinspired designs
38.
strategies for human resource and local policies
39.
strategies of inquiry
40.
suboptimal feedback strategies
41.
sub-optimal feedback strategies
42.
synthesis strategies
43.
teaching strategies
44.
ad-hoc sensor networks security
45.
Automatic Security Verification
46.
Blockchain security
47.
cache security
48.
communication system security
49.
comprehensive system of economic security
50.
computer security
51.
cooperative security dilemma
52.
cyber security
53.
cyber security education
54.
cyber security exercises
55.
cyber security monitoring
56.
cyber-security
57.
data and information security
58.
data security
59.
development of security cameras
60.
digital security practices
61.
drinking water security
62.
economic security
63.
economic security of enterprise
64.
emotional security
65.
energy security
66.
energy security indicator
67.
Estonian information security standard
68.
graded security
69.
hardware security
70.
hardware security primitive
71.
high level of security
72.
Homeland security
73.
human security
74.
information security
75.
information security and privacy
76.
initial level of security
77.
internal security
78.
international security
79.
investment and innovation security
80.
IPv6 security
81.
IT security
82.
IT security management
83.
job security
84.
long-term security
85.
maritime cyber security
86.
maritime cyber security operations centers
87.
Maritime Security Operations Center (M-SOC)
88.
medium level of security
89.
metadata model for security measures
90.
Middle Eastern security
91.
Mobile security
92.
national cyber security strategy
93.
national security
94.
NATO. Science for Peace and Security Program
95.
network security
96.
network security monitoring
97.
OSCE (Organization for Security and Co-operation in Europe)
98.
passenger’s security
99.
policy-based routing security
100.
political and security cultures
101.
post-quantum security
102.
power system security
103.
quantitative security
104.
regional security
105.
RISC-V Security Verification
106.
Safety and Security in Sea Transportation
107.
safety and security testing
108.
security
109.
security adaptation
110.
security alert prioritization
111.
security analysis
112.
security and justice (AFSJ)
113.
Security and political science
114.
security and privacy
115.
security and privacy in smart grids
116.
Security Assertion Mining
117.
security closure
118.
Security Coverage
119.
security dataset
120.
security dilemma
121.
Security evaluation
122.
security evaluation instruments
123.
Security limitations
124.
security log analysis
125.
security management
126.
security model
127.
security monitoring
128.
security notion
129.
security objectives
130.
security of data
131.
security of supply
132.
security operation center
133.
security operations center
134.
security patterns
135.
security policy
136.
security problem definition
137.
security proof
138.
security protocols
139.
security requirements
140.
security requirements engineering
141.
security research
142.
security risk assessment
143.
security risk management
144.
security risks
145.
security science and technology
146.
security systems for military objects
147.
security testing
148.
security training
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
software security
154.
software security level
155.
software security subcharacteristics
156.
sufficient level of security
157.
system of economic security
158.
system security
159.
terrorism security
160.
transmission System Security
161.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT