Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of supply (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/191)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Future outlook and current situation for security of gas supply in Eastern Baltic region
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
World Academy of Science, Engineering and Technology. International journal of social, human science and engineering
2013
/
p. 1287-1294 : ill
journal article
2
journal article
Improving security of gas supply in Eastern Baltic region : LNG terminal alternatives
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
International journal of energy
2014
/
p. 1-7
journal article
3
book article
Security of gas supply in Eastern Baltic region : current situation and future outlook
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
Recent Advances in Energy Planning and Environment : proceedings of the 7th WSEAS International Conference on Energy Planning, Energy Saving, Environmental Education (EPESE '13), Paris, France, October 29-31, 2013
2013
/
p. 71-80 : ill
book article
4
book article
The Eastern Baltic LNG terminal as a prospect to improve security of regional gas supply
Kõrbe Kaare, Kati
;
Koppel, Ott
;
Leppiman, Ando
Recent Advances in Environment, Energy, Ecosystems and Development : proceedings of the 2013 International Conference on Environment, Energy, Ecosystems and Development (EEEAD 2013), Venice, Italy, September 28-30, 2013
2013
/
p. 158-164
book article
5
book article
Wind park and transmission network cooperation considering Grid Code requirements
Kilter, Jako
;
Dubbelman, Edgar
;
Palu, Ivo
;
Niitsoo, Jaan
Electrical and Control Technologies : proceedings of the the 7th International Conference on Electrical and Control Technologies ECT-2012
2012
/
p. 183-188 : ill
https://www.researchgate.net/publication/290252818_Wind_park_and_transmission_network_cooperation_considering_Grid_Code_requirements
book article
Number of records 5, displaying
1 - 5
keyword
189
1.
security of supply
2.
automated supply air temperature (ASAT)
3.
auxiliary power supply
4.
carbon-neutral energy supply
5.
DC power supply
6.
demand & supply chain management
7.
digital supply chain
8.
diversified supply options
9.
electricity supply industry deregulation
10.
fashion supply chains
11.
global supply chains
12.
green supply chain management
13.
grid supply
14.
grid-connected power supply
15.
Labour supply
16.
legume supply chain
17.
limitation of supply
18.
local power supply system
19.
Logistics and supply chain management
20.
maitime supply chains
21.
metal stirring combined DC and AC supply
22.
money supply
23.
obligation to supply
24.
off-grid hybrid power supply
25.
power supply
26.
quality of supply
27.
refusal to supply
28.
Renewable electricity supply
29.
road construction supply chain
30.
service supply chain
31.
smart supply chains
32.
supply
33.
supply and demand
34.
supply and use tables
35.
supply chain
36.
supply chain (SC)
37.
supply chain competences
38.
supply chain curricula
39.
supply chain engineering
40.
supply chain integration
41.
supply chain management
42.
supply chain model framework
43.
supply chain operations reference (SCOR)
44.
supply chain operations reference (SCOR) model
45.
supply chain planning
46.
supply chain risk
47.
supply chain risk management
48.
supply chain simulation
49.
supply chain skills
50.
supply chain traceability
51.
supply chains
52.
supply networks
53.
supply routes for natural gas
54.
supply shock
55.
supply systems
56.
supply voltage quality
57.
sustainable supply chain management
58.
Sustainable supply chains management
59.
sustainalble supply chain management
60.
switch mode power supply
61.
switchedmode power supply
62.
switched-mode power supply
63.
teaching supply chain management
64.
termination of supply
65.
transparent supply chain
66.
uninterruptible power supply (UPS)
67.
welding power supply
68.
ad-hoc sensor networks security
69.
Automatic Security Verification
70.
Blockchain security
71.
cache security
72.
cloud security
73.
communication system security
74.
comprehensive system of economic security
75.
computer security
76.
cooperative security dilemma
77.
cyber security
78.
cyber security education
79.
cyber security exercises
80.
cyber security monitoring
81.
cyber security strategies
82.
cyber-security
83.
data and information security
84.
data security
85.
development of security cameras
86.
digital security practices
87.
drinking water security
88.
economic security
89.
economic security of enterprise
90.
emotional security
91.
energy security
92.
energy security indicator
93.
Estonian information security standard
94.
graded security
95.
hardware security
96.
hardware security primitive
97.
high level of security
98.
Homeland security
99.
human security
100.
information security
101.
information security and privacy
102.
initial level of security
103.
internal security
104.
international security
105.
investment and innovation security
106.
IPv6 security
107.
IT security
108.
IT security management
109.
job security
110.
long-term security
111.
maritime cyber security
112.
maritime cyber security operations centers
113.
Maritime Security Operations Center (M-SOC)
114.
medium level of security
115.
metadata model for security measures
116.
Middle Eastern security
117.
Mobile security
118.
national cyber security strategy
119.
national security
120.
NATO. Science for Peace and Security Program
121.
network security
122.
network security monitoring
123.
OSCE (Organization for Security and Co-operation in Europe)
124.
passenger’s security
125.
policy-based routing security
126.
political and security cultures
127.
post-quantum security
128.
power system security
129.
quantitative security
130.
regional security
131.
RISC-V Security Verification
132.
Safety and Security in Sea Transportation
133.
safety and security testing
134.
security
135.
security adaptation
136.
security alert prioritization
137.
security analysis
138.
security and justice (AFSJ)
139.
Security and political science
140.
security and privacy
141.
security and privacy in smart grids
142.
Security Assertion
143.
Security Assertion Mining
144.
security closure
145.
Security Coverage
146.
security dataset
147.
security dilemma
148.
Security evaluation
149.
security evaluation instruments
150.
Security Level Evaluation
151.
Security limitations
152.
security log analysis
153.
security management
154.
security model
155.
security monitoring
156.
security notion
157.
security objectives
158.
security of data
159.
security operation center
160.
security operations center
161.
security patterns
162.
security policy
163.
security problem definition
164.
security proof
165.
security protocols
166.
security requirements
167.
security requirements engineering
168.
security research
169.
security risk assessment
170.
security risk management
171.
security risks
172.
security science and technology
173.
security strategies
174.
security systems for military objects
175.
security testing
176.
security training
177.
security verification
178.
security-by-design
179.
social security planning
180.
societal security
181.
software security
182.
software security level
183.
software security subcharacteristics
184.
sufficient level of security
185.
system of economic security
186.
system security
187.
terrorism security
188.
transmission System Security
189.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT