Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of supply (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/193)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Future outlook and current situation for security of gas supply in Eastern Baltic region
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
World Academy of Science, Engineering and Technology. International journal of social, human science and engineering
2013
/
p. 1287-1294 : ill
journal article
2
journal article
Improving security of gas supply in Eastern Baltic region : LNG terminal alternatives
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
International journal of energy
2014
/
p. 1-7
journal article
3
book article
Security of gas supply in Eastern Baltic region : current situation and future outlook
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
Recent Advances in Energy Planning and Environment : proceedings of the 7th WSEAS International Conference on Energy Planning, Energy Saving, Environmental Education (EPESE '13), Paris, France, October 29-31, 2013
2013
/
p. 71-80 : ill
book article
4
book article
The Eastern Baltic LNG terminal as a prospect to improve security of regional gas supply
Kõrbe Kaare, Kati
;
Koppel, Ott
;
Leppiman, Ando
Recent Advances in Environment, Energy, Ecosystems and Development : proceedings of the 2013 International Conference on Environment, Energy, Ecosystems and Development (EEEAD 2013), Venice, Italy, September 28-30, 2013
2013
/
p. 158-164
book article
5
book article
Wind park and transmission network cooperation considering Grid Code requirements
Kilter, Jako
;
Dubbelman, Edgar
;
Palu, Ivo
;
Niitsoo, Jaan
Electrical and Control Technologies : proceedings of the the 7th International Conference on Electrical and Control Technologies ECT-2012
2012
/
p. 183-188 : ill
https://www.researchgate.net/publication/290252818_Wind_park_and_transmission_network_cooperation_considering_Grid_Code_requirements
book article
Number of records 5, displaying
1 - 5
keyword
191
1.
security of supply
2.
automated supply air temperature (ASAT)
3.
auxiliary power supply
4.
carbon-neutral energy supply
5.
DC power supply
6.
demand & supply chain management
7.
digital supply chain
8.
diversified supply options
9.
electricity supply industry deregulation
10.
fashion supply chains
11.
global supply chains
12.
green supply chain management
13.
grid supply
14.
grid-connected power supply
15.
Labour supply
16.
legume supply chain
17.
limitation of supply
18.
local power supply system
19.
Logistics and supply chain management
20.
maitime supply chains
21.
metal stirring combined DC and AC supply
22.
money supply
23.
obligation to supply
24.
off-grid hybrid power supply
25.
power supply
26.
quality of supply
27.
refusal to supply
28.
Renewable electricity supply
29.
road construction supply chain
30.
service supply chain
31.
smart supply chains
32.
supply
33.
supply and demand
34.
supply and use tables
35.
supply chain
36.
supply chain (SC)
37.
supply chain competences
38.
supply chain curricula
39.
supply chain engineering
40.
supply chain integration
41.
supply chain management
42.
supply chain model framework
43.
supply chain operations reference (SCOR)
44.
supply chain operations reference (SCOR) model
45.
supply chain planning
46.
supply chain risk
47.
supply chain risk management
48.
supply chain simulation
49.
supply chain skills
50.
supply chain traceability
51.
supply chains
52.
supply networks
53.
supply routes for natural gas
54.
supply shock
55.
supply systems
56.
supply voltage quality
57.
sustainable supply chain management
58.
Sustainable supply chains management
59.
sustainalble supply chain management
60.
switch mode power supply
61.
switchedmode power supply
62.
switched-mode power supply
63.
teaching supply chain management
64.
termination of supply
65.
transparent supply chain
66.
uninterruptible power supply (UPS)
67.
welding power supply
68.
ad-hoc sensor networks security
69.
Automatic Security Verification
70.
Blockchain security
71.
cache security
72.
cloud security
73.
communication system security
74.
comprehensive system of economic security
75.
computer security
76.
cooperative security dilemma
77.
cyber security
78.
cyber security education
79.
cyber security exercises
80.
cyber security monitoring
81.
cyber security monitoring in maritime
82.
cyber security strategies
83.
cyber-physical system security
84.
cyber-security
85.
data and information security
86.
data security
87.
development of security cameras
88.
digital security practices
89.
drinking water security
90.
economic security
91.
economic security of enterprise
92.
emotional security
93.
energy security
94.
energy security indicator
95.
Estonian information security standard
96.
graded security
97.
hardware security
98.
hardware security primitive
99.
high level of security
100.
Homeland security
101.
human security
102.
information security
103.
information security and privacy
104.
initial level of security
105.
internal security
106.
international security
107.
investment and innovation security
108.
IPv6 security
109.
IT security
110.
IT security management
111.
job security
112.
long-term security
113.
maritime cyber security
114.
maritime cyber security operations centers
115.
Maritime Security Operations Center (M-SOC)
116.
medium level of security
117.
metadata model for security measures
118.
Middle Eastern security
119.
Mobile security
120.
national cyber security strategy
121.
national security
122.
NATO. Science for Peace and Security Program
123.
network security
124.
network security monitoring
125.
OSCE (Organization for Security and Co-operation in Europe)
126.
passenger’s security
127.
policy-based routing security
128.
political and security cultures
129.
post-quantum security
130.
power system security
131.
quantitative security
132.
regional security
133.
RISC-V Security Verification
134.
Safety and Security in Sea Transportation
135.
safety and security testing
136.
security
137.
security adaptation
138.
security alert prioritization
139.
security analysis
140.
security and justice (AFSJ)
141.
Security and political science
142.
security and privacy
143.
security and privacy in smart grids
144.
Security Assertion
145.
Security Assertion Mining
146.
security closure
147.
Security Coverage
148.
security dataset
149.
security dilemma
150.
Security evaluation
151.
security evaluation instruments
152.
Security Level Evaluation
153.
Security limitations
154.
security log analysis
155.
security management
156.
security model
157.
security monitoring
158.
security notion
159.
security objectives
160.
security of data
161.
security operation center
162.
security operations center
163.
security patterns
164.
security policy
165.
security problem definition
166.
security proof
167.
security protocols
168.
security requirements
169.
security requirements engineering
170.
security research
171.
security risk assessment
172.
security risk management
173.
security risks
174.
security science and technology
175.
security strategies
176.
security systems for military objects
177.
security testing
178.
security training
179.
security verification
180.
security-by-design
181.
social security planning
182.
societal security
183.
software security
184.
software security level
185.
software security subcharacteristics
186.
sufficient level of security
187.
system of economic security
188.
system security
189.
terrorism security
190.
transmission System Security
191.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT