Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
human security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/239)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Responsibility to protect and human security: doctrines destroying or strengthening the sovereignty?
Uusitalo, Jenna
International and comparative law review
2018
/
p. 89–103
https://doi.org/10.2478/iclr-2018-0021
journal article
Number of records 1, displaying
1 - 1
keyword
237
1.
human security
2.
human factor of cybersecurity
3.
human factors in cybersecurity
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dataset
80.
security dilemma
81.
Security evaluation
82.
security evaluation instruments
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security operations center
94.
security patterns
95.
security policy
96.
security problem definition
97.
security proof
98.
security protocols
99.
security requirements
100.
security requirements engineering
101.
security research
102.
security risk assessment
103.
security risk management
104.
security risks
105.
security science and technology
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
security-by-design
112.
social security planning
113.
societal security
114.
software security
115.
software security level
116.
software security subcharacteristics
117.
sufficient level of security
118.
system of economic security
119.
system security
120.
terrorism security
121.
transmission System Security
122.
voting privacy and security
123.
basic human values
124.
business and human rights
125.
design methodology and human-centred design
126.
Digital/Human configurations
127.
environmental and human safety index
128.
European Convention on Human Rights
129.
European Court of Human Rights
130.
fundamental human rights
131.
generations of human rights
132.
genome (human)
133.
genome, human
134.
history of human rights
135.
human
136.
human activity recognition
137.
human activity recognition (HAR)
138.
Human agency
139.
human augmentation
140.
human behavior
141.
human behavior modeling
142.
human behaviour
143.
Human brands
144.
human capital
145.
human capital accumulation
146.
human capital reporting
147.
human characteristics
148.
human cognition
149.
human computer interaction
150.
human computer interaction (HCI)
151.
Human Cytomegalovirus (CMV)
152.
human development
153.
human dignity
154.
human disease
155.
human EEG
156.
human element
157.
human emotional and physiological states
158.
human emotions
159.
human error
160.
human experience
161.
human factor
162.
human factor (HF)
163.
human factors
164.
human factors in vehicular system
165.
human gait
166.
human gait modeling
167.
human gait plant
168.
human genome
169.
human gut microbiome
170.
human gut microbiota
171.
human health
172.
human impact
173.
human influence
174.
human intervention studies
175.
human life expectancy
176.
human limb
177.
human machine interaction
178.
human machine systems
179.
human mobility
180.
human motion analysis
181.
human motor functions
182.
human movement patterns
183.
human neural progenitor cells
184.
human ovarian follicle
185.
human oversight
186.
human pancreatic lipase
187.
human papilloma virus
188.
human path rehabilitation
189.
human perception
190.
human performance factors
191.
human population size
192.
human privacy
193.
human readable
194.
human resource and Strategy Europe 2020
195.
human resource competitiveness
196.
human resource development
197.
human resource management
198.
human resources
199.
human review
200.
human rights
201.
human rights of minors
202.
human robot collaboration (HRC)
203.
human robot interaction
204.
human safety
205.
human shortcomings
206.
human skeletal remains
207.
human social presence
208.
human stefin B
209.
human thermal plume
210.
human-AI collaboration
211.
Human-brand based marketing
212.
Human-centered
213.
human-centered design
214.
Human-centered planning
215.
human-centred learning
216.
human-centredness
217.
human-centric design
218.
human-computer interaction
219.
human–computer interaction
220.
Human-Computer Interaction (HCI)
221.
human-computer trust
222.
human-landscape relationship
223.
human-machine interaction
224.
human-machine interactions
225.
human-machine interface
226.
human-machine system
227.
human-readable
228.
human-robot
229.
human-robot collaboration
230.
human-robot interaction
231.
human–robot interaction
232.
human-robot interaction (HRI)
233.
international human rights law
234.
social and human capital
235.
standardized "human" prototype
236.
strategic human resource management
237.
strategies for human resource and local policies
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT