Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
regional security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/148)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Association of Southeast Asian Nations (ASEAN)
Valuch, Josef
;
Hamulak, Ondrej
International conflict and security law : a research handbook
2022
/
p. 595-608
https://doi.org/10.1007/978-94-6265-515-7_27
book article
2
book article
The Islamic State, clash of civilizations and their impact on the development of contemporary international relations
Mölder, Holger
Cultural crossroads in the Middle East : the historical, cultural and political legacy of intercultural dialogue and conflict from the ancient Near East to the present day
2020
/
p. 314-345
https://www.ester.ee/record=b5259885*est
book article
Number of records 2, displaying
1 - 2
keyword
145
1.
regional security
2.
Burtnieki Regional Stage
3.
Ecological Regional Ocean Model (ERGOM)
4.
Economic growth and aggregate productivity regional government analysis
5.
gross regional product
6.
Haljala Regional Stage
7.
Kunda Regional Stage
8.
melanoma loco-regional treatment
9.
R11 - regional economic activity
10.
regional aircraft
11.
regional airport
12.
regional airports
13.
Regional and local government policy
14.
regional aviation
15.
regional branding
16.
regional chemotherapy
17.
regional cooperation
18.
regional co-operation
19.
regional courts
20.
regional courts of justice
21.
regional development
22.
regional economic integration
23.
regional economies
24.
regional extinctions
25.
regional geoid
26.
regional geoid modelling
27.
Regional governments
28.
regional higher education institutions
29.
regional innovation
30.
regional innovation networks
31.
regional innovation strategies on smart specialization (RIS3)
32.
regional institutions
33.
Regional integrated energy system (RIES)
34.
regional integration
35.
regional learning
36.
regional management
37.
regional modelling
38.
Regional oceanography
39.
regional organisations
40.
regional policy
41.
regional sediment balance
42.
regional specialization
43.
regional stage
44.
regional stratigraphy
45.
regional terminals
46.
regional visual read
47.
Vojvyv Regional Stage
48.
ad-hoc sensor networks security
49.
Automatic Security Verification
50.
Blockchain security
51.
cache security
52.
communication system security
53.
comprehensive system of economic security
54.
computer security
55.
cooperative security dilemma
56.
cyber security
57.
cyber security education
58.
cyber security exercises
59.
cyber security strategies
60.
cyber-security
61.
data security
62.
development of security cameras
63.
drinking water security
64.
economic security
65.
economic security of enterprise
66.
emotional security
67.
energy security
68.
energy security indicator
69.
Estonian information security standard
70.
graded security
71.
hardware security
72.
hardware security primitive
73.
human security
74.
information security
75.
internal security
76.
international security
77.
investment and innovation security
78.
IPv6 security
79.
IT security
80.
IT security management
81.
job security
82.
long-term security
83.
metadata model for security measures
84.
Middle Eastern security
85.
Mobile security
86.
national cyber security strategy
87.
national security
88.
NATO. Science for Peace and Security Program
89.
network security
90.
network security monitoring
91.
OSCE (Organization for Security and Co-operation in Europe)
92.
passenger’s security
93.
policy-based routing security
94.
political and security cultures
95.
post-quantum security
96.
power system security
97.
quantitative security
98.
RISC-V Security Verification
99.
safety and security testing
100.
security
101.
security adaptation
102.
security alert prioritization
103.
security analysis
104.
security and justice (AFSJ)
105.
security and privacy
106.
security and privacy in smart grids
107.
Security Assertion Mining
108.
security closure
109.
Security Coverage
110.
security dataset
111.
security dilemma
112.
Security evaluation
113.
security evaluation instruments
114.
security log analysis
115.
security management
116.
security model
117.
security monitoring
118.
security notion
119.
security objectives
120.
security of data
121.
security of supply
122.
security operation center
123.
security operations center
124.
security patterns
125.
security policy
126.
security problem definition
127.
security proof
128.
security protocols
129.
security requirements
130.
security requirements engineering
131.
security risk assessment
132.
security risk management
133.
security strategies
134.
security systems for military objects
135.
security testing
136.
security training
137.
security verification
138.
security-by-design
139.
social security planning
140.
societal security
141.
system of economic security
142.
system security
143.
terrorism security
144.
transmission System Security
145.
voting privacy and security
subject term
3
1.
European Regional Development Fund
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT