Academic literature on the topic 'Threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threat"
Kiely, P., and C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (April 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.
Full textHamad, Mohammad, and Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study." Information 11, no. 5 (May 19, 2020): 273. http://dx.doi.org/10.3390/info11050273.
Full textKappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald, and Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat." Clinical Psychological Science 9, no. 3 (March 24, 2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.
Full textMUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.
Full textSandy, Djoko Andoko, Poppy Setiawati Nurisnaeny, and Mira Murniasari. "The Threat of Social Network Games in Indonesia." Borneo Educational Journal (Borju) 5, no. 2 (August 26, 2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.
Full textBedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang, and Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management." ACM SIGSOFT Software Engineering Notes 38, no. 1 (January 23, 2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textRiek, Blake M., Eric W. Mania, and Samuel L. Gaertner. "Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review." Personality and Social Psychology Review 10, no. 4 (November 2006): 336–53. http://dx.doi.org/10.1207/s15327957pspr1004_4.
Full textSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Full textDissertations / Theses on the topic "Threat"
Eckert, Christine. "Stereotype Threat." Ruprecht-Karls-Universität, 2014. https://ul.qucosa.de/id/qucosa%3A15350.
Full textEckert, Christine. "Stereotype Threat." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-219437.
Full textDunning, John Paul. "Bluetooth Threat Taxonomy." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.
Full textMaster of Science
Taylor, Emma. "A veiled threat." Thesis, Taylor, Emma (2011) A veiled threat. Honours thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/41700/.
Full textZahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Full textOlandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Full textFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Full textDissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
Lee, Jong-Eun Roselyn. ""A threat on the net" : stereotype threat in avatar-represented online groups /." May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textMunshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.
Full textRoberts, Marianne. "Threat processing in fibromyalgia." Thesis, University of Southampton, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617820.
Full textBooks on the topic "Threat"
Muñoz, Victoria C. Thread threat: Formaldehyde in textiles. New York: Nova Science Publishers, 2011.
Find full textCopyright Paperback Collection (Library of Congress), ed. Threat warning. New York: Pinnacle Books/Kensington Pub. Corp., 2011.
Find full textThe threat. New York: St. Martin's Press, 2006.
Find full textCantore, Janice. Visible threat. Waterville, Maine: Thorndike Press, a part of Gale, Cengage Learning, 2014.
Find full textOpper, Richard Henry. Elemental threat. Claremont, CA: Oak Tree Press, 2002.
Find full text1952-, Morrisey Tom, ed. Kiloton threat. Nashville, Tenn: B&H Publishing Group, 2011.
Find full textThe threat. New York, NY: Simon & Schuster, 1998.
Find full textRue, Nancy N. The threat. Minneapolis, Minn: Bethany House Publishers, 1998.
Find full textEmerson, Earl. Primal Threat. New York: Random House Publishing Group, 2008.
Find full textGuest, Jacqueline. Triple threat. Toronto: J. Lorimer, 2011.
Find full textBook chapters on the topic "Threat"
Wolf, Marilyn, and Dimitrios Serpanos. "Threats and Threat Analysis." In Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.
Full textMöller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security, 71–129. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.
Full textDas, Ravindra. "Threat Modeling/Threat Hunting." In The Zero Trust Framework, 113–37. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003392965-5.
Full textWeik, Martin H. "threat." In Computer Science and Communications Dictionary, 1780. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19544.
Full textBruce, Toni. "Threat." In Terra Ludus, 73–78. Rotterdam: SensePublishers, 2016. http://dx.doi.org/10.1007/978-94-6300-770-2_9.
Full textVerschelden, Cia, and Kofi Lomotey. "Stereotype Threat and Identity Threat." In Bandwidth Recovery For Schools, 31–35. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003443162-3.
Full text"From threat to threat." In The Routledge Companion to UK Counter-Terrorism, 280–98. Routledge, 2012. http://dx.doi.org/10.4324/9780203105573-27.
Full text"threat." In Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200985.
Full text"threat." In Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200986.
Full text"Threat." In Encyclopedia of Child Behavior and Development, 1486. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-79061-9_5941.
Full textConference papers on the topic "Threat"
Languirand, Eric R., Amee Polk, Michael Kauzlarich, Jacob Buchman, and Matthew D. Collins. "Emerging explosive threat analysis for using threat anomaly detection (ThreAD)." In Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XXV, edited by Jason A. Guicheteau, Christopher R. Howle, and Tanya L. Myers. SPIE, 2024. http://dx.doi.org/10.1117/12.3016072.
Full textClark, K., C. Lee, S. Tyree, and J. Hale. "Guiding Threat Analysis with Threat Source Models." In 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381942.
Full textCain, Curtis C., and Eileen M. Trauth. "Stereotype threat." In the 2013 annual conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487294.2487305.
Full textPramanik, Sarah. "Threat motivation." In 2013 10th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT). IEEE, 2013. http://dx.doi.org/10.1109/cewit.2013.6851346.
Full textYskout, Koen, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, and Wouter Joosen. "Threat modeling." In ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377816.3381741.
Full textHo, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg, and Muye Liu. "Insider Threat." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.
Full textCasey, Timothy, Patrick Koeberl, and Claire Vishik. "Threat agents." In the Sixth Annual Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852728.
Full textKohli, Harpreet, Dale Lindskog, Pavol Zavarsky, and Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats." In 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.
Full textShrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.
Full textChibueze Brendan, Ahuokpeme, and John McCarthy. "Taxonomy of Threat Categorization and Threat Intelligence Platform." In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 2019. http://dx.doi.org/10.1109/icgs3.2019.8688157.
Full textReports on the topic "Threat"
Woodard, Laura, Cynthia K. Veitch, Sherry Reede Thomas, and David Patrick Duggan. Categorizing threat : building and using a generic threat matrix. Office of Scientific and Technical Information (OSTI), September 2007. http://dx.doi.org/10.2172/921121.
Full textWebb, Jeff. Cooperative Threat Reduction. Fort Belvoir, VA: Defense Technical Information Center, April 1997. http://dx.doi.org/10.21236/ada398063.
Full textDuggan, David Patrick. Generic threat profiles. Office of Scientific and Technical Information (OSTI), July 2005. http://dx.doi.org/10.2172/882540.
Full textKessler, Andrew, Michael Shewfelt, Jennifer Davis, Brian Connett, Jared Chiu-Rourman, Joseph Oravec, Shaunnah Wark, Ling Siew Ng, Seng Chuan Lim, and Cheng Lock Chua. Maritime Threat Response. Fort Belvoir, VA: Defense Technical Information Center, June 2006. http://dx.doi.org/10.21236/ada462563.
Full textFrye, Jason Neal, Cynthia K. Veitch, Mark Elliot Mateski, John T. Michalski, James Mark Harris, Cassandra M. Trevino, and Scott Maruoka. Cyber threat metrics. Office of Scientific and Technical Information (OSTI), March 2012. http://dx.doi.org/10.2172/1039394.
Full textMcKinney, Terry L., Timothy E. Moore, Robert E. Bender, Steven I. Case, Cheryl L. Snyder, Karen A. Ulatowski, David P. Goodykoontz, Kevin G. Burrowes, Breon E. Dehoux, and Theresa L. Tameris. Cooperative Threat Reduction: Contracts Awarded by the Defense Threat Reduction Agency in Support of the Cooperative Threat Reduction Program. Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada433189.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126557.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126558.
Full textPatrick Treado, Oksana Klueva, and Jeffrey Beckstead. Airborne Particulate Threat Assessment. Office of Scientific and Technical Information (OSTI), December 2008. http://dx.doi.org/10.2172/966354.
Full textYoung, Byron J. Terrorism: Analyzing the Threat. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada344982.
Full text