Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
internal security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/121)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
European internal security interests and Brexit. Legal and operational aspects of the post–Brexit cooperation model
Loik, Ramon
Romanian journal of European affairs
2020
/
p. 5-17
http://rjea.ier.gov.ro/en/issues/rjea-vol-20-no-2-december-2020/
journal article
2
journal article
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
journal article
Number of records 2, displaying
1 - 2
keyword
119
1.
internal security
2.
corresponding internal variable
3.
dual internal variables
4.
hierarchical internal variable
5.
internal audit
6.
internal barriers
7.
internal combustion engine
8.
internal combustion engines
9.
internal conditions
10.
internal control
11.
internal damping
12.
internal devaluation
13.
internal discharge
14.
internal friction
15.
internal heat gain
16.
internal insulation
17.
Internal Market and Customs Union
18.
internal mechanics
19.
internal partial discharge
20.
internal pressure
21.
Internal Rate of Return (IRR)
22.
internal representations
23.
internal Rossby radius
24.
internal seiches
25.
internal solitons
26.
internal variables
27.
internal waves
28.
internal-flow hydraulic modelling
29.
internal-fow head
30.
single and dual internal variables
31.
ad-hoc sensor networks security
32.
Automatic Security Verification
33.
Blockchain security
34.
cache security
35.
communication system security
36.
comprehensive system of economic security
37.
computer security
38.
cooperative security dilemma
39.
cyber security
40.
cyber security education
41.
cyber security exercises
42.
cyber security strategies
43.
cyber-security
44.
data security
45.
development of security cameras
46.
drinking water security
47.
economic security
48.
economic security of enterprise
49.
emotional security
50.
energy security
51.
energy security indicator
52.
graded security
53.
hardware security
54.
hardware security primitive
55.
human security
56.
information security
57.
international security
58.
investment and innovation security
59.
IPv6 security
60.
IT security
61.
IT security management
62.
job security
63.
long-term security
64.
metadata model for security measures
65.
Middle Eastern security
66.
Mobile security
67.
national cyber security strategy
68.
national security
69.
NATO. Science for Peace and Security Program
70.
network security
71.
network security monitoring
72.
OSCE (Organization for Security and Co-operation in Europe)
73.
passenger’s security
74.
policy-based routing security
75.
political and security cultures
76.
post-quantum security
77.
power system security
78.
quantitative security
79.
regional security
80.
RISC-V Security Verification
81.
security
82.
security and privacy
83.
security and privacy in smart grids
84.
Security Assertion Mining
85.
security closure
86.
Security Coverage
87.
security dataset
88.
security dilemma
89.
Security evaluation
90.
security log analysis
91.
security management
92.
security model
93.
security monitoring
94.
security notion
95.
security objectives
96.
security of data
97.
security of supply
98.
security operation center
99.
security patterns
100.
security policy
101.
security problem definition
102.
security proof
103.
security protocols
104.
security requirements
105.
security requirements engineering
106.
security risk assessment
107.
security risk management
108.
security strategies
109.
security systems for military objects
110.
security testing
111.
security training
112.
security verification
113.
social security planning
114.
societal security
115.
system of economic security
116.
system security
117.
terrorism security
118.
transmission System Security
119.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT