Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
human security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/239)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Responsibility to protect and human security: doctrines destroying or strengthening the sovereignty?
Uusitalo, Jenna
International and comparative law review
2018
/
p. 89–103
https://doi.org/10.2478/iclr-2018-0021
artikkel ajakirjas
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
237
1.
human security
2.
human factor of cybersecurity
3.
human factors in cybersecurity
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security monitoring
16.
cyber security strategies
17.
cyber-security
18.
data and information security
19.
data security
20.
development of security cameras
21.
digital security practices
22.
drinking water security
23.
economic security
24.
economic security of enterprise
25.
emotional security
26.
energy security
27.
energy security indicator
28.
Estonian information security standard
29.
graded security
30.
hardware security
31.
hardware security primitive
32.
high level of security
33.
Homeland security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dataset
80.
security dilemma
81.
Security evaluation
82.
security evaluation instruments
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security operations center
94.
security patterns
95.
security policy
96.
security problem definition
97.
security proof
98.
security protocols
99.
security requirements
100.
security requirements engineering
101.
security research
102.
security risk assessment
103.
security risk management
104.
security risks
105.
security science and technology
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
security-by-design
112.
social security planning
113.
societal security
114.
software security
115.
software security level
116.
software security subcharacteristics
117.
sufficient level of security
118.
system of economic security
119.
system security
120.
terrorism security
121.
transmission System Security
122.
voting privacy and security
123.
basic human values
124.
business and human rights
125.
design methodology and human-centred design
126.
Digital/Human configurations
127.
environmental and human safety index
128.
European Convention on Human Rights
129.
European Court of Human Rights
130.
fundamental human rights
131.
generations of human rights
132.
genome (human)
133.
genome, human
134.
history of human rights
135.
human
136.
human activity recognition
137.
human activity recognition (HAR)
138.
Human agency
139.
human augmentation
140.
human behavior
141.
human behavior modeling
142.
human behaviour
143.
Human brands
144.
human capital
145.
human capital accumulation
146.
human capital reporting
147.
human characteristics
148.
human cognition
149.
human computer interaction
150.
human computer interaction (HCI)
151.
Human Cytomegalovirus (CMV)
152.
human development
153.
human dignity
154.
human disease
155.
human EEG
156.
human element
157.
human emotional and physiological states
158.
human emotions
159.
human error
160.
human experience
161.
human factor
162.
human factor (HF)
163.
human factors
164.
human factors in vehicular system
165.
human gait
166.
human gait modeling
167.
human gait plant
168.
human genome
169.
human gut microbiome
170.
human gut microbiota
171.
human health
172.
human impact
173.
human influence
174.
human intervention studies
175.
human life expectancy
176.
human limb
177.
human machine interaction
178.
human machine systems
179.
human mobility
180.
human motion analysis
181.
human motor functions
182.
human movement patterns
183.
human neural progenitor cells
184.
human ovarian follicle
185.
human oversight
186.
human pancreatic lipase
187.
human papilloma virus
188.
human path rehabilitation
189.
human perception
190.
human performance factors
191.
human population size
192.
human privacy
193.
human readable
194.
human resource and Strategy Europe 2020
195.
human resource competitiveness
196.
human resource development
197.
human resource management
198.
human resources
199.
human review
200.
human rights
201.
human rights of minors
202.
human robot collaboration (HRC)
203.
human robot interaction
204.
human safety
205.
human shortcomings
206.
human skeletal remains
207.
human social presence
208.
human stefin B
209.
human thermal plume
210.
human-AI collaboration
211.
Human-brand based marketing
212.
Human-centered
213.
human-centered design
214.
Human-centered planning
215.
human-centred learning
216.
human-centredness
217.
human-centric design
218.
human-computer interaction
219.
human–computer interaction
220.
Human-Computer Interaction (HCI)
221.
human-computer trust
222.
human-landscape relationship
223.
human-machine interaction
224.
human-machine interactions
225.
human-machine interface
226.
human-machine system
227.
human-readable
228.
human-robot
229.
human-robot collaboration
230.
human-robot interaction
231.
human–robot interaction
232.
human-robot interaction (HRI)
233.
international human rights law
234.
social and human capital
235.
standardized "human" prototype
236.
strategic human resource management
237.
strategies for human resource and local policies
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT