Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
internal security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/119)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
European internal security interests and Brexit. Legal and operational aspects of the post–Brexit cooperation model
Loik, Ramon
Romanian journal of European affairs
2020
/
p. 5-17
http://rjea.ier.gov.ro/en/issues/rjea-vol-20-no-2-december-2020/
journal article
2
journal article
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
journal article
Number of records 2, displaying
1 - 2
keyword
117
1.
internal security
2.
corresponding internal variable
3.
dual internal variables
4.
hierarchical internal variable
5.
internal audit
6.
internal barriers
7.
internal combustion engine
8.
internal combustion engines
9.
internal conditions
10.
internal control
11.
internal damping
12.
internal devaluation
13.
internal discharge
14.
internal friction
15.
internal heat gain
16.
internal insulation
17.
Internal Market and Customs Union
18.
internal mechanics
19.
internal partial discharge
20.
internal pressure
21.
Internal Rate of Return (IRR)
22.
internal representations
23.
internal Rossby radius
24.
internal seiches
25.
internal solitons
26.
internal variables
27.
internal waves
28.
internal-flow hydraulic modelling
29.
internal-fow head
30.
single and dual internal variables
31.
ad-hoc sensor networks security
32.
Automatic Security Verification
33.
Blockchain security
34.
cache security
35.
communication system security
36.
comprehensive system of economic security
37.
computer security
38.
cooperative security dilemma
39.
cyber security
40.
cyber security education
41.
cyber security exercises
42.
cyber security strategies
43.
cyber-security
44.
data security
45.
development of security cameras
46.
drinking water security
47.
economic security
48.
economic security of enterprise
49.
emotional security
50.
energy security
51.
energy security indicator
52.
graded security
53.
hardware security
54.
hardware security primitive
55.
human security
56.
information security
57.
international security
58.
investment and innovation security
59.
IPv6 security
60.
IT security
61.
job security
62.
long-term security
63.
metadata model for security measures
64.
Middle Eastern security
65.
Mobile security
66.
national cyber security strategy
67.
national security
68.
NATO. Science for Peace and Security Program
69.
network security
70.
network security monitoring
71.
OSCE (Organization for Security and Co-operation in Europe)
72.
passenger’s security
73.
policy-based routing security
74.
political and security cultures
75.
post-quantum security
76.
power system security
77.
quantitative security
78.
regional security
79.
RISC-V Security Verification
80.
security
81.
security and privacy
82.
security and privacy in smart grids
83.
Security Assertion Mining
84.
security closure
85.
Security Coverage
86.
security dataset
87.
security dilemma
88.
Security evaluation
89.
security log analysis
90.
security management
91.
security model
92.
security monitoring
93.
security notion
94.
security objectives
95.
security of data
96.
security of supply
97.
security operation center
98.
security patterns
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security risk assessment
105.
security risk management
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
social security planning
112.
societal security
113.
system of economic security
114.
system security
115.
terrorism security
116.
transmission System Security
117.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT