Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security strategies (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/166)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
The prospects of strategic imagination in explaining international security challenges
Mölder, Holger
Quality & Quantity : International Journal of Methodology
2023
/
p. 55-76
https://doi.org/10.1007/s11135-022-01386-w
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
164
1.
cyber security strategies
2.
security strategies
3.
airport strategies
4.
bias mitigation strategies
5.
climate strategies
6.
co-design strategies
7.
collaboration strategies
8.
control optimization strategies
9.
coping strategies
10.
course development strategies
11.
cultural adjustment strategies
12.
cultural tourism strategies
13.
digital strategies
14.
Educational strategies
15.
e-Government policies and strategies
16.
energy management strategies (EMS)
17.
enterprise strategies
18.
EoL strategies
19.
EU policies and strategies
20.
European firefighting strategies
21.
fixation strategies
22.
graph and tree search strategies
23.
HVAC control strategies
24.
hybrid strategies
25.
innovation in processing strategies
26.
management strategies
27.
marketing strategies
28.
mitigation strategies
29.
mitigation strategies of UHI effect
30.
passive design strategies
31.
portfolio of strategies
32.
questioning strategies
33.
regional innovation strategies on smart specialization (RIS3)
34.
research strategies
35.
smart specialization strategies (S3)
36.
strategies
37.
strategies and concepts of bioinspired designs
38.
strategies for human resource and local policies
39.
strategies of inquiry
40.
suboptimal feedback strategies
41.
sub-optimal feedback strategies
42.
synthesis strategies
43.
teaching strategies
44.
ad-hoc sensor networks security
45.
Automatic Security Verification
46.
Blockchain security
47.
cache security
48.
cloud security
49.
communication system security
50.
comprehensive system of economic security
51.
computer security
52.
cooperative security dilemma
53.
cyber security
54.
cyber security education
55.
cyber security exercises
56.
cyber security monitoring
57.
cyber-security
58.
data and information security
59.
data security
60.
development of security cameras
61.
digital security practices
62.
drinking water security
63.
economic security
64.
economic security of enterprise
65.
emotional security
66.
energy security
67.
energy security indicator
68.
Estonian information security standard
69.
graded security
70.
hardware security
71.
hardware security primitive
72.
high level of security
73.
Homeland security
74.
human security
75.
information security
76.
information security and privacy
77.
initial level of security
78.
internal security
79.
international security
80.
investment and innovation security
81.
IPv6 security
82.
IT security
83.
IT security management
84.
job security
85.
long-term security
86.
maritime cyber security
87.
maritime cyber security operations centers
88.
Maritime Security Operations Center (M-SOC)
89.
medium level of security
90.
metadata model for security measures
91.
Middle Eastern security
92.
Mobile security
93.
national cyber security strategy
94.
national security
95.
NATO. Science for Peace and Security Program
96.
network security
97.
network security monitoring
98.
OSCE (Organization for Security and Co-operation in Europe)
99.
passenger’s security
100.
policy-based routing security
101.
political and security cultures
102.
post-quantum security
103.
power system security
104.
quantitative security
105.
regional security
106.
RISC-V Security Verification
107.
Safety and Security in Sea Transportation
108.
safety and security testing
109.
security
110.
security adaptation
111.
security alert prioritization
112.
security analysis
113.
security and justice (AFSJ)
114.
Security and political science
115.
security and privacy
116.
security and privacy in smart grids
117.
Security Assertion
118.
Security Assertion Mining
119.
security closure
120.
Security Coverage
121.
security dataset
122.
security dilemma
123.
Security evaluation
124.
security evaluation instruments
125.
Security Level Evaluation
126.
Security limitations
127.
security log analysis
128.
security management
129.
security model
130.
security monitoring
131.
security notion
132.
security objectives
133.
security of data
134.
security of supply
135.
security operation center
136.
security operations center
137.
security patterns
138.
security policy
139.
security problem definition
140.
security proof
141.
security protocols
142.
security requirements
143.
security requirements engineering
144.
security research
145.
security risk assessment
146.
security risk management
147.
security risks
148.
security science and technology
149.
security systems for military objects
150.
security testing
151.
security training
152.
security verification
153.
security-by-design
154.
social security planning
155.
societal security
156.
software security
157.
software security level
158.
software security subcharacteristics
159.
sufficient level of security
160.
system of economic security
161.
system security
162.
terrorism security
163.
transmission System Security
164.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT