Gå till sökfältet
Gå till sidans huvudinnehåll
Gå till tillgänglighetsredogörelsen
Forskning.fi
Menu
Suomeksi
På svenska
In English
Ingångssida
Sökning
Vetenskaps- och innovationspolitik
Vetenskaps- och forskningsnyheter
På svenska
- 4173 results
Publikationer
4173
Utlysningar
0
Beviljade finansiering
15
Personer
0
Data
135
Infrastrukturer
0
Organisationer
0
Projekt
0
Publikationer -
4 173
sökresultat
Gå till sökresultaten
Visa som bild
Begränsa sökning
Resultaten visas 1 - 10 / 4173
10
50
100
resultat / per sida
Vilka
publikations
uppgifter finns i tjänsten?
Icon
Publikationens namn
Upphovspersoner
Publikationskanal
År
Publicationer information ikon
European Integration Beyond Brussels:Unity in East and West Europe Since 1945
Referentgranskad
Broad, Matthew; Kansikas, Suvi
Security
,
Conflict
and Cooperation in the Contemporary World
2020
Publicationer information ikon
Konfliktien kartoitus suunnittelun apuvälineenä [
Conflict
assessment and
conflict
mapping as planning tools]
Referentgranskad
Peltonen, Lasse; Kangasoja, Jonna
Yhdyskuntasuunnittelu
2009
Publicationer information ikon
Fighting with words:humanitarian
security
and the changing role of law in contemporary armed
conflict
Referentgranskad
Öppen tillgång
DOI
10.1111/disa.12580
Tammi, Iida Maria
Disasters
2023
Publicationer information ikon
The
Conflict
Escalation Resolution (CONFER) Database
Referentgranskad
Öppen tillgång
DOI
10.1016/j.imavis.2016.12.001
Georgakis, Christos; Panagakis, Yannis; Zafeiriou, Stefanos; Pantic, Maja
Image and vision computing
2017
Publicationer information ikon
Less than Membership but More than Association:Establishing the European Economic Area, 1989–1993
Referentgranskad
DOI
10.1007/978-3-030-45445-6
Aunesluoma, Juhana
Security
,
Conflict
and Cooperation in the Contemporary World
2020
Publicationer information ikon
Subregional Integration in East Central Europe:Strategies in the In-Between Sphere
Referentgranskad
Öppen tillgång
DOI
10.1007/978-3-030-45445-6_12
Miklóssy, Katalin
Security
,
Conflict
and Cooperation in the Contemporary World
2020
Publicationer information ikon
Security
objectives within a
security
testing case study
Referentgranskad
DOI
10.1109/ARES.2007.136
Karppinen, Kaarina; Savola, Reijo; Rapeli, Mikko; Tikkala, Esa
2nd International Conference on Availability, Reliability and
Security
, ARES 2007
2007
Publicationer information ikon
National
Security
and Human Rights in International Law
Öppen tillgång
DOI
10.21827/GroJIL.8.1.123-149
MORRIS, P. Sean
Groningen Journal of International Law
2020
Publicationer information ikon
From
security
modelling to run-time
security
monitoring
Referentgranskad
Evesti, Antti; Ovaska, Eila; Savola, Reijo
European Workshop on
Security
in Model Driven Architecture 2009, SECMDA 2009
2009
Publicationer information ikon
Transparent
Security
Method for Automating IoT
Security
Assessments
Referentgranskad
Öppen tillgång
DOI
10.1007/978-981-99-7032-2_9
Kaksonen, Rauli; Halunen, Kimmo; Laakso, Marko; Röning, Juha
Lecture notes in computer science
2023
European Integration Beyond Brussels:Unity in East and West Europe Since 1945
Referentgranskad
2020
Konfliktien kartoitus suunnittelun apuvälineenä [
Conflict
assessment and
conflict
mapping as planning tools]
Referentgranskad
2009
Fighting with words:humanitarian
security
and the changing role of law in contemporary armed
conflict
Referentgranskad
Öppen tillgång
DOI
10.1111/disa.12580
2023
The
Conflict
Escalation Resolution (CONFER) Database
Referentgranskad
Öppen tillgång
DOI
10.1016/j.imavis.2016.12.001
2017
Less than Membership but More than Association:Establishing the European Economic Area, 1989–1993
Referentgranskad
DOI
10.1007/978-3-030-45445-6
2020
Subregional Integration in East Central Europe:Strategies in the In-Between Sphere
Referentgranskad
Öppen tillgång
DOI
10.1007/978-3-030-45445-6_12
2020
Security
objectives within a
security
testing case study
Referentgranskad
DOI
10.1109/ARES.2007.136
2007
National
Security
and Human Rights in International Law
Öppen tillgång
DOI
10.21827/GroJIL.8.1.123-149
2020
From
security
modelling to run-time
security
monitoring
Referentgranskad
2009
Transparent
Security
Method for Automating IoT
Security
Assessments
Referentgranskad
Öppen tillgång
DOI
10.1007/978-981-99-7032-2_9
2023
Föregående
1
2
3
4
5
Nästa
Resultaten visas 1 - 10 / 4173
Sida 1
Sort