Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
security and justice (AFSJ) (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/149)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Internal security cooperation under functional expectations : initial law enforcement Europeanization - case of Finland and Estonia
Loik, Ramon
;
Hämäläinen, Erkki
;
Veebel, Viljar
Romanian Journal of European Affairs
2016
/
p. 5 - 23
http://rjea.ier.gov.ro/wp-content/uploads/revista/RJEA_2015_vol16_no1_site.pdf
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
147
1.
security and justice (AFSJ)
2.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
3.
access to justice
4.
court of justice
5.
Court of Justice of European Union
6.
Court of Justice of the European Union
7.
data justice
8.
digital justice
9.
distributional health justice
10.
e-justice
11.
e-justice blockchain
12.
environmental justice
13.
EU justice and home affairs (JHA)
14.
European Court of Justice (ECJ)
15.
justice
16.
juvenile justice
17.
Natural resource justice
18.
perceived justice
19.
post-conflict justice
20.
procedural justice
21.
regional courts of justice
22.
resource justice
23.
restorative justice
24.
retributive justice
25.
spatial justice
26.
ad-hoc sensor networks security
27.
Automatic Security Verification
28.
Blockchain security
29.
cache security
30.
cloud security
31.
communication system security
32.
comprehensive system of economic security
33.
computer security
34.
cooperative security dilemma
35.
cyber security
36.
cyber security education
37.
cyber security exercises
38.
cyber security monitoring
39.
cyber security strategies
40.
cyber-security
41.
data and information security
42.
data security
43.
development of security cameras
44.
digital security practices
45.
drinking water security
46.
economic security
47.
economic security of enterprise
48.
emotional security
49.
energy security
50.
energy security indicator
51.
Estonian information security standard
52.
graded security
53.
hardware security
54.
hardware security primitive
55.
high level of security
56.
Homeland security
57.
human security
58.
information security
59.
information security and privacy
60.
initial level of security
61.
internal security
62.
international security
63.
investment and innovation security
64.
IPv6 security
65.
IT security
66.
IT security management
67.
job security
68.
long-term security
69.
maritime cyber security
70.
maritime cyber security operations centers
71.
Maritime Security Operations Center (M-SOC)
72.
medium level of security
73.
metadata model for security measures
74.
Middle Eastern security
75.
Mobile security
76.
national cyber security strategy
77.
national security
78.
NATO. Science for Peace and Security Program
79.
network security
80.
network security monitoring
81.
OSCE (Organization for Security and Co-operation in Europe)
82.
passenger’s security
83.
policy-based routing security
84.
political and security cultures
85.
post-quantum security
86.
power system security
87.
quantitative security
88.
regional security
89.
RISC-V Security Verification
90.
Safety and Security in Sea Transportation
91.
safety and security testing
92.
security
93.
security adaptation
94.
security alert prioritization
95.
security analysis
96.
Security and political science
97.
security and privacy
98.
security and privacy in smart grids
99.
Security Assertion
100.
Security Assertion Mining
101.
security closure
102.
Security Coverage
103.
security dataset
104.
security dilemma
105.
Security evaluation
106.
security evaluation instruments
107.
Security Level Evaluation
108.
Security limitations
109.
security log analysis
110.
security management
111.
security model
112.
security monitoring
113.
security notion
114.
security objectives
115.
security of data
116.
security of supply
117.
security operation center
118.
security operations center
119.
security patterns
120.
security policy
121.
security problem definition
122.
security proof
123.
security protocols
124.
security requirements
125.
security requirements engineering
126.
security research
127.
security risk assessment
128.
security risk management
129.
security risks
130.
security science and technology
131.
security strategies
132.
security systems for military objects
133.
security testing
134.
security training
135.
security verification
136.
security-by-design
137.
social security planning
138.
societal security
139.
software security
140.
software security level
141.
software security subcharacteristics
142.
sufficient level of security
143.
system of economic security
144.
system security
145.
terrorism security
146.
transmission System Security
147.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT