Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
NATO science for peace and security series. C, Environmental security (series)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/122)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Chemical analysis of dumped chemical warfare agents during the MODUM project
Söderström, Martin
;
Östin, Anders
;
Vaher, Merike
;
Jõul, Piia
;
Lees, Heidi
;
Kaljurand, Mihkel
Towards the monitoring of dumped munitions threat (MODUM) : a study of chemical munitions dumpsites in the Baltic Sea
2018
/
p. 71-103
https://doi.org/10.1007/978-94-024-1153-9_4
Article collections at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 1, displaying
1 - 1
keyword
120
1.
NATO. Science for Peace and Security Program
2.
Security and political science
3.
security science and technology
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
human security
35.
information security
36.
information security and privacy
37.
initial level of security
38.
internal security
39.
international security
40.
investment and innovation security
41.
IPv6 security
42.
IT security
43.
IT security management
44.
job security
45.
long-term security
46.
Maritime Security Operations Center (M-SOC)
47.
medium level of security
48.
metadata model for security measures
49.
Middle Eastern security
50.
Mobile security
51.
national cyber security strategy
52.
national security
53.
network security
54.
network security monitoring
55.
OSCE (Organization for Security and Co-operation in Europe)
56.
passenger’s security
57.
policy-based routing security
58.
political and security cultures
59.
post-quantum security
60.
power system security
61.
quantitative security
62.
regional security
63.
RISC-V Security Verification
64.
Safety and Security in Sea Transportation
65.
safety and security testing
66.
security
67.
security adaptation
68.
security alert prioritization
69.
security analysis
70.
security and justice (AFSJ)
71.
security and privacy
72.
security and privacy in smart grids
73.
Security Assertion Mining
74.
security closure
75.
Security Coverage
76.
security dataset
77.
security dilemma
78.
Security evaluation
79.
security evaluation instruments
80.
Security limitations
81.
security log analysis
82.
security management
83.
security model
84.
security monitoring
85.
security notion
86.
security objectives
87.
security of data
88.
security of supply
89.
security operation center
90.
security operations center
91.
security patterns
92.
security policy
93.
security problem definition
94.
security proof
95.
security protocols
96.
security requirements
97.
security requirements engineering
98.
security risk assessment
99.
security risk management
100.
security risks
101.
security strategies
102.
security systems for military objects
103.
security testing
104.
security training
105.
security verification
106.
security-by-design
107.
social security planning
108.
societal security
109.
software security
110.
software security level
111.
software security subcharacteristics
112.
sufficient level of security
113.
system of economic security
114.
system security
115.
terrorism security
116.
transmission System Security
117.
voting privacy and security
118.
environmental science
119.
conservative and regular series-to-series matrices
120.
normal series-to-series matrices
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT