Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security of supply (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
5
Look more..
(2/184)
Export
export all inquiry results
(5)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Future outlook and current situation for security of gas supply in Eastern Baltic region
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
World Academy of Science, Engineering and Technology. International journal of social, human science and engineering
2013
/
p. 1287-1294 : ill
journal article
2
journal article
Improving security of gas supply in Eastern Baltic region : LNG terminal alternatives
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
International journal of energy
2014
/
p. 1-7
journal article
3
book article
Security of gas supply in Eastern Baltic region : current situation and future outlook
Leppiman, Ando
;
Kõrbe Kaare, Kati
;
Koppel, Ott
Recent Advances in Energy Planning and Environment : proceedings of the 7th WSEAS International Conference on Energy Planning, Energy Saving, Environmental Education (EPESE '13), Paris, France, October 29-31, 2013
2013
/
p. 71-80 : ill
book article
4
book article
The Eastern Baltic LNG terminal as a prospect to improve security of regional gas supply
Kõrbe Kaare, Kati
;
Koppel, Ott
;
Leppiman, Ando
Recent Advances in Environment, Energy, Ecosystems and Development : proceedings of the 2013 International Conference on Environment, Energy, Ecosystems and Development (EEEAD 2013), Venice, Italy, September 28-30, 2013
2013
/
p. 158-164
book article
5
book article
Wind park and transmission network cooperation considering Grid Code requirements
Kilter, Jako
;
Dubbelman, Edgar
;
Palu, Ivo
;
Niitsoo, Jaan
Electrical and Control Technologies : proceedings of the the 7th International Conference on Electrical and Control Technologies ECT-2012
2012
/
p. 183-188 : ill
https://www.researchgate.net/publication/290252818_Wind_park_and_transmission_network_cooperation_considering_Grid_Code_requirements
book article
Number of records 5, displaying
1 - 5
keyword
182
1.
security of supply
2.
auxiliary power supply
3.
carbon-neutral energy supply
4.
DC power supply
5.
demand & supply chain management
6.
digital supply chain
7.
diversified supply options
8.
electricity supply industry deregulation
9.
fashion supply chains
10.
global supply chains
11.
green supply chain management
12.
grid supply
13.
grid-connected power supply
14.
Labour supply
15.
legume supply chain
16.
limitation of supply
17.
local power supply system
18.
Logistics and supply chain management
19.
maitime supply chains
20.
metal stirring combined DC and AC supply
21.
money supply
22.
obligation to supply
23.
off-grid hybrid power supply
24.
power supply
25.
quality of supply
26.
refusal to supply
27.
Renewable electricity supply
28.
road construction supply chain
29.
service supply chain
30.
smart supply chains
31.
supply
32.
supply and demand
33.
supply and use tables
34.
supply chain
35.
supply chain (SC)
36.
supply chain competences
37.
supply chain curricula
38.
supply chain engineering
39.
supply chain integration
40.
supply chain management
41.
supply chain model framework
42.
supply chain operations reference (SCOR)
43.
supply chain operations reference (SCOR) model
44.
supply chain planning
45.
supply chain risk
46.
supply chain risk management
47.
supply chain simulation
48.
supply chain skills
49.
supply chain traceability
50.
supply chains
51.
supply networks
52.
supply routes for natural gas
53.
supply shock
54.
supply systems
55.
supply voltage quality
56.
sustainable supply chain management
57.
Sustainable supply chains management
58.
sustainalble supply chain management
59.
switch mode power supply
60.
switchedmode power supply
61.
switched-mode power supply
62.
teaching supply chain management
63.
termination of supply
64.
transparent supply chain
65.
uninterruptible power supply (UPS)
66.
welding power supply
67.
ad-hoc sensor networks security
68.
Automatic Security Verification
69.
Blockchain security
70.
cache security
71.
communication system security
72.
comprehensive system of economic security
73.
computer security
74.
cooperative security dilemma
75.
cyber security
76.
cyber security education
77.
cyber security exercises
78.
cyber security monitoring
79.
cyber security strategies
80.
cyber-security
81.
data and information security
82.
data security
83.
development of security cameras
84.
digital security practices
85.
drinking water security
86.
economic security
87.
economic security of enterprise
88.
emotional security
89.
energy security
90.
energy security indicator
91.
Estonian information security standard
92.
graded security
93.
hardware security
94.
hardware security primitive
95.
high level of security
96.
Homeland security
97.
human security
98.
information security
99.
information security and privacy
100.
initial level of security
101.
internal security
102.
international security
103.
investment and innovation security
104.
IPv6 security
105.
IT security
106.
IT security management
107.
job security
108.
long-term security
109.
Maritime Security Operations Center (M-SOC)
110.
medium level of security
111.
metadata model for security measures
112.
Middle Eastern security
113.
Mobile security
114.
national cyber security strategy
115.
national security
116.
NATO. Science for Peace and Security Program
117.
network security
118.
network security monitoring
119.
OSCE (Organization for Security and Co-operation in Europe)
120.
passenger’s security
121.
policy-based routing security
122.
political and security cultures
123.
post-quantum security
124.
power system security
125.
quantitative security
126.
regional security
127.
RISC-V Security Verification
128.
Safety and Security in Sea Transportation
129.
safety and security testing
130.
security
131.
security adaptation
132.
security alert prioritization
133.
security analysis
134.
security and justice (AFSJ)
135.
Security and political science
136.
security and privacy
137.
security and privacy in smart grids
138.
Security Assertion Mining
139.
security closure
140.
Security Coverage
141.
security dataset
142.
security dilemma
143.
Security evaluation
144.
security evaluation instruments
145.
Security limitations
146.
security log analysis
147.
security management
148.
security model
149.
security monitoring
150.
security notion
151.
security objectives
152.
security of data
153.
security operation center
154.
security operations center
155.
security patterns
156.
security policy
157.
security problem definition
158.
security proof
159.
security protocols
160.
security requirements
161.
security requirements engineering
162.
security risk assessment
163.
security risk management
164.
security risks
165.
security science and technology
166.
security strategies
167.
security systems for military objects
168.
security testing
169.
security training
170.
security verification
171.
security-by-design
172.
social security planning
173.
societal security
174.
software security
175.
software security level
176.
software security subcharacteristics
177.
sufficient level of security
178.
system of economic security
179.
system security
180.
terrorism security
181.
transmission System Security
182.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT