Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of supply (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/187)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Future outlook and current situation for security of gas supply in Eastern Baltic region
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
World Academy of Science, Engineering and Technology. International journal of social, human science and engineering
2013
/
p. 1287-1294 : ill
journal article
2
journal article
Improving security of gas supply in Eastern Baltic region : LNG terminal alternatives
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
International journal of energy
2014
/
p. 1-7
journal article
3
book article
Security of gas supply in Eastern Baltic region : current situation and future outlook
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
Recent Advances in Energy Planning and Environment : proceedings of the 7th WSEAS International Conference on Energy Planning, Energy Saving, Environmental Education (EPESE '13), Paris, France, October 29-31, 2013
2013
/
p. 71-80 : ill
book article
4
book article
The Eastern Baltic LNG terminal as a prospect to improve security of regional gas supply
Kõrbe Kaare, Kati
;
Koppel, Ott
;
Leppiman, Ando
Recent Advances in Environment, Energy, Ecosystems and Development : proceedings of the 2013 International Conference on Environment, Energy, Ecosystems and Development (EEEAD 2013), Venice, Italy, September 28-30, 2013
2013
/
p. 158-164
book article
5
book article
Wind park and transmission network cooperation considering Grid Code requirements
Kilter, Jako
;
Dubbelman, Edgar
;
Palu, Ivo
;
Niitsoo, Jaan
Electrical and Control Technologies : proceedings of the the 7th International Conference on Electrical and Control Technologies ECT-2012
2012
/
p. 183-188 : ill
https://www.researchgate.net/publication/290252818_Wind_park_and_transmission_network_cooperation_considering_Grid_Code_requirements
book article
Number of records 5, displaying
1 - 5
keyword
185
1.
security of supply
2.
automated supply air temperature (ASAT)
3.
auxiliary power supply
4.
carbon-neutral energy supply
5.
DC power supply
6.
demand & supply chain management
7.
digital supply chain
8.
diversified supply options
9.
electricity supply industry deregulation
10.
fashion supply chains
11.
global supply chains
12.
green supply chain management
13.
grid supply
14.
grid-connected power supply
15.
Labour supply
16.
legume supply chain
17.
limitation of supply
18.
local power supply system
19.
Logistics and supply chain management
20.
maitime supply chains
21.
metal stirring combined DC and AC supply
22.
money supply
23.
obligation to supply
24.
off-grid hybrid power supply
25.
power supply
26.
quality of supply
27.
refusal to supply
28.
Renewable electricity supply
29.
road construction supply chain
30.
service supply chain
31.
smart supply chains
32.
supply
33.
supply and demand
34.
supply and use tables
35.
supply chain
36.
supply chain (SC)
37.
supply chain competences
38.
supply chain curricula
39.
supply chain engineering
40.
supply chain integration
41.
supply chain management
42.
supply chain model framework
43.
supply chain operations reference (SCOR)
44.
supply chain operations reference (SCOR) model
45.
supply chain planning
46.
supply chain risk
47.
supply chain risk management
48.
supply chain simulation
49.
supply chain skills
50.
supply chain traceability
51.
supply chains
52.
supply networks
53.
supply routes for natural gas
54.
supply shock
55.
supply systems
56.
supply voltage quality
57.
sustainable supply chain management
58.
Sustainable supply chains management
59.
sustainalble supply chain management
60.
switch mode power supply
61.
switchedmode power supply
62.
switched-mode power supply
63.
teaching supply chain management
64.
termination of supply
65.
transparent supply chain
66.
uninterruptible power supply (UPS)
67.
welding power supply
68.
ad-hoc sensor networks security
69.
Automatic Security Verification
70.
Blockchain security
71.
cache security
72.
communication system security
73.
comprehensive system of economic security
74.
computer security
75.
cooperative security dilemma
76.
cyber security
77.
cyber security education
78.
cyber security exercises
79.
cyber security monitoring
80.
cyber security strategies
81.
cyber-security
82.
data and information security
83.
data security
84.
development of security cameras
85.
digital security practices
86.
drinking water security
87.
economic security
88.
economic security of enterprise
89.
emotional security
90.
energy security
91.
energy security indicator
92.
Estonian information security standard
93.
graded security
94.
hardware security
95.
hardware security primitive
96.
high level of security
97.
Homeland security
98.
human security
99.
information security
100.
information security and privacy
101.
initial level of security
102.
internal security
103.
international security
104.
investment and innovation security
105.
IPv6 security
106.
IT security
107.
IT security management
108.
job security
109.
long-term security
110.
maritime cyber security
111.
maritime cyber security operations centers
112.
Maritime Security Operations Center (M-SOC)
113.
medium level of security
114.
metadata model for security measures
115.
Middle Eastern security
116.
Mobile security
117.
national cyber security strategy
118.
national security
119.
NATO. Science for Peace and Security Program
120.
network security
121.
network security monitoring
122.
OSCE (Organization for Security and Co-operation in Europe)
123.
passenger’s security
124.
policy-based routing security
125.
political and security cultures
126.
post-quantum security
127.
power system security
128.
quantitative security
129.
regional security
130.
RISC-V Security Verification
131.
Safety and Security in Sea Transportation
132.
safety and security testing
133.
security
134.
security adaptation
135.
security alert prioritization
136.
security analysis
137.
security and justice (AFSJ)
138.
Security and political science
139.
security and privacy
140.
security and privacy in smart grids
141.
Security Assertion Mining
142.
security closure
143.
Security Coverage
144.
security dataset
145.
security dilemma
146.
Security evaluation
147.
security evaluation instruments
148.
Security limitations
149.
security log analysis
150.
security management
151.
security model
152.
security monitoring
153.
security notion
154.
security objectives
155.
security of data
156.
security operation center
157.
security operations center
158.
security patterns
159.
security policy
160.
security problem definition
161.
security proof
162.
security protocols
163.
security requirements
164.
security requirements engineering
165.
security risk assessment
166.
security risk management
167.
security risks
168.
security science and technology
169.
security strategies
170.
security systems for military objects
171.
security testing
172.
security training
173.
security verification
174.
security-by-design
175.
social security planning
176.
societal security
177.
software security
178.
software security level
179.
software security subcharacteristics
180.
sufficient level of security
181.
system of economic security
182.
system security
183.
terrorism security
184.
transmission System Security
185.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT