Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
economic security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
4
Vaata veel..
(2/229)
Ekspordi
ekspordi kõik päringu tulemused
(4)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Cybersecurity in the era of hypercompetitiveness : can the EU meet the new challenges?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69/en
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
Economic security of enterprise and the system of its ensuring
Ianioglo, Alina
;
Põlajeva, Tatjana
;
Parmacli, Dmitri
Scientific Conference Contemporary Issues in Business, Management and Education 2015 : selected papers : 12-13 November 2015, Vilnius, Lithuania
2015
/
p. 1-8 : ill
http://dx.doi.org/10.3846/cibme.2015.05
artikkel kogumikus
3
artikkel ajakirjas
La ciberseguridad en la era de hipercompetitividad: ¿puede la Union Europea afrontar los nuevos retos?
Munkoe, Malthe
;
Mölder, Holger
Revista CIDOB d'afers internacionals
2022
/
p. 69-94
https://doi.org/10.24241/rcai.2022.131.2.69
artikkel ajakirjas
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
The essence and phases of the comprehensive system of ensuring the economic security of enterprise
Ianioglo, Alina
;
Põlajeva, Tatjana
International journal of learning and change
2017
/
p. 59-74
https://doi.org/10.1504/IJLC.2017.084223
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 4, kuvan
1 - 4
võtmesõna
227
1.
comprehensive system of economic security
2.
economic security
3.
economic security of enterprise
4.
system of economic security
5.
ad-hoc sensor networks security
6.
Automatic Security Verification
7.
Blockchain security
8.
cache security
9.
cloud security
10.
communication system security
11.
computer security
12.
cooperative security dilemma
13.
cyber security
14.
cyber security education
15.
cyber security exercises
16.
cyber security monitoring
17.
cyber security monitoring in maritime
18.
cyber security strategies
19.
cyber-physical system security
20.
cyber-security
21.
data and information security
22.
data security
23.
development of security cameras
24.
digital security practices
25.
drinking water security
26.
emotional security
27.
energy security
28.
energy security indicator
29.
Estonian information security standard
30.
graded security
31.
hardware security
32.
hardware security primitive
33.
high level of security
34.
Homeland security
35.
human security
36.
information security
37.
information security and privacy
38.
initial level of security
39.
internal security
40.
international security
41.
investment and innovation security
42.
IPv6 security
43.
IT security
44.
IT security management
45.
job security
46.
long-term security
47.
maritime cyber security
48.
maritime cyber security operations centers
49.
Maritime Security Operations Center (M-SOC)
50.
medium level of security
51.
metadata model for security measures
52.
Middle Eastern security
53.
Mobile security
54.
national cyber security strategy
55.
national security
56.
NATO. Science for Peace and Security Program
57.
network security
58.
network security monitoring
59.
OSCE (Organization for Security and Co-operation in Europe)
60.
passenger’s security
61.
policy-based routing security
62.
political and security cultures
63.
post-quantum security
64.
power system security
65.
quantitative security
66.
regional security
67.
RISC-V Security Verification
68.
Safety and Security in Sea Transportation
69.
safety and security testing
70.
security
71.
security adaptation
72.
security alert prioritization
73.
security analysis
74.
security and justice (AFSJ)
75.
Security and political science
76.
security and privacy
77.
security and privacy in smart grids
78.
Security Assertion
79.
Security Assertion Mining
80.
security closure
81.
Security Coverage
82.
security dataset
83.
security dilemma
84.
Security evaluation
85.
security evaluation instruments
86.
Security Level Evaluation
87.
Security limitations
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of data
95.
security of supply
96.
security operation center
97.
security operations center
98.
security patterns
99.
security policy
100.
security problem definition
101.
security proof
102.
security protocols
103.
security requirements
104.
security requirements engineering
105.
security research
106.
security risk assessment
107.
security risk management
108.
security risks
109.
security science and technology
110.
security strategies
111.
security systems for military objects
112.
security testing
113.
security training
114.
security verification
115.
security-by-design
116.
social security planning
117.
societal security
118.
software security
119.
software security level
120.
software security subcharacteristics
121.
sufficient level of security
122.
system security
123.
terrorism security
124.
transmission System Security
125.
voting privacy and security
126.
asymmetric economic integration
127.
combined heat and power economic dispatch (CHPED)
128.
comparative economic development
129.
comparative economic systems
130.
cubic economic load dispatch
131.
development of economic thought
132.
Early Islamic economic thought
133.
economic
134.
economic policy coordination
135.
economic education
136.
economic activity
137.
Economic Allocation
138.
economic analysis
139.
Economic and Monetary Union
140.
economic and social cohesion
141.
economic and social effects
142.
economic benefits
143.
economic complexity
144.
economic conditions
145.
economic convergence
146.
economic cooperation
147.
economic crisis
148.
economic cycle
149.
Economic Development
150.
Economic Development and Growth
151.
economic development policy
152.
economic developmnet
153.
economic dispatch
154.
economic effect
155.
economic efficiency
156.
economic environment
157.
economic feasibility
158.
economic feasibility analysis
159.
economic fluctuations
160.
economic growth
161.
Economic growth and aggregate productivity regional government analysis
162.
economic history
163.
economic history Europe
164.
economic impact
165.
economic indicators
166.
economic insulation thickness
167.
economic integration
168.
economic interests
169.
economic load dispatch
170.
economic load dispatch (ELD)
171.
Economic Management
172.
economic model
173.
economic modeling
174.
economic motives
175.
economic networks
176.
Economic optimization model
177.
economic performance
178.
economic planning
179.
economic policies
180.
economic policy
181.
Economic policy uncertainty
182.
economic populism
183.
economic power dispatch
184.
economic recession
185.
economic recession of 2008-2011
186.
economic reforms
187.
economic regulation
188.
economic regulation assessment
189.
Economic risk
190.
economic sanctions
191.
economic shocks
192.
economic theory
193.
economic transformations
194.
Economic transit
195.
economic transition
196.
environmental and economic losses of the construction project
197.
environmental and economic regulation
198.
European economic integration
199.
European Economic Space
200.
European history of economic thought
201.
fiscal and economic effects
202.
History of Chinese economic thought and philosophy
203.
history of economic thought before 1750
204.
mathematical models for economic problems
205.
R11 - regional economic activity
206.
regional economic integration
207.
Silk Road Economic Belt
208.
social and economic impacts
209.
social-economic analysis
210.
Socio-economic context
211.
socio-economic development
212.
socio-economic factors
213.
socio-economic impacts
214.
socio-economic risks
215.
socio-economic status
216.
socio-economic system change
217.
sustainable economic growth
218.
techno-economic
219.
Techno-economic analysis
220.
techno-economic assessment
221.
Techno-economic modelling
222.
techno-economic paradigm shifts
223.
techno-economic paradigms
224.
The organisation for economic cooperation and development (OECD)
225.
theory of economic development
226.
unreported economic activity
227.
wear and economic feasibility map
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT