Literatura académica sobre el tema "Threat"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Threat".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Threat"
Kiely, P. y C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (abril de 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.
Texto completoHamad, Mohammad y Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study". Information 11, n.º 5 (19 de mayo de 2020): 273. http://dx.doi.org/10.3390/info11050273.
Texto completoKappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald y Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat". Clinical Psychological Science 9, n.º 3 (24 de marzo de 2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.
Texto completoMUGISHA, ARTHUR R. y SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda". Environmental Conservation 31, n.º 3 (septiembre de 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.
Texto completoSandy, Djoko Andoko, Poppy Setiawati Nurisnaeny y Mira Murniasari. "The Threat of Social Network Games in Indonesia". Borneo Educational Journal (Borju) 5, n.º 2 (26 de agosto de 2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.
Texto completoBedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang y Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management". ACM SIGSOFT Software Engineering Notes 38, n.º 1 (23 de enero de 2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.
Texto completoMuhammed, Khaleel, Aavudai Anandhi, Gang Chen y Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, n.º 20 (12 de octubre de 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Texto completoMuhammed, Khaleel, Aavudai Anandhi, Gang Chen y Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, n.º 20 (12 de octubre de 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Texto completoRiek, Blake M., Eric W. Mania y Samuel L. Gaertner. "Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review". Personality and Social Psychology Review 10, n.º 4 (noviembre de 2006): 336–53. http://dx.doi.org/10.1207/s15327957pspr1004_4.
Texto completoSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities". Actual problems of innovative economy, n.º 3 (30 de mayo de 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Texto completoTesis sobre el tema "Threat"
Eckert, Christine. "Stereotype Threat". Ruprecht-Karls-Universität, 2014. https://ul.qucosa.de/id/qucosa%3A15350.
Texto completoEckert, Christine. "Stereotype Threat". Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-219437.
Texto completoDunning, John Paul. "Bluetooth Threat Taxonomy". Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.
Texto completoMaster of Science
Taylor, Emma. "A veiled threat". Thesis, Taylor, Emma (2011) A veiled threat. Honours thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/41700/.
Texto completoZahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Texto completoOlandersson, Sandra y Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Texto completoFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Texto completoDissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
Lee, Jong-Eun Roselyn. ""A threat on the net" : stereotype threat in avatar-represented online groups /". May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Texto completoMunshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model". Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.
Texto completoRoberts, Marianne. "Threat processing in fibromyalgia". Thesis, University of Southampton, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617820.
Texto completoLibros sobre el tema "Threat"
Muñoz, Victoria C. Thread threat: Formaldehyde in textiles. New York: Nova Science Publishers, 2011.
Buscar texto completoCopyright Paperback Collection (Library of Congress), ed. Threat warning. New York: Pinnacle Books/Kensington Pub. Corp., 2011.
Buscar texto completoThe threat. New York: St. Martin's Press, 2006.
Buscar texto completoCantore, Janice. Visible threat. Waterville, Maine: Thorndike Press, a part of Gale, Cengage Learning, 2014.
Buscar texto completoOpper, Richard Henry. Elemental threat. Claremont, CA: Oak Tree Press, 2002.
Buscar texto completo1952-, Morrisey Tom, ed. Kiloton threat. Nashville, Tenn: B&H Publishing Group, 2011.
Buscar texto completoThe threat. New York, NY: Simon & Schuster, 1998.
Buscar texto completoRue, Nancy N. The threat. Minneapolis, Minn: Bethany House Publishers, 1998.
Buscar texto completoEmerson, Earl. Primal Threat. New York: Random House Publishing Group, 2008.
Buscar texto completoGuest, Jacqueline. Triple threat. Toronto: J. Lorimer, 2011.
Buscar texto completoCapítulos de libros sobre el tema "Threat"
Wolf, Marilyn y Dimitrios Serpanos. "Threats and Threat Analysis". En Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.
Texto completoMöller, Dietmar P. F. "Threats and Threat Intelligence". En Advances in Information Security, 71–129. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.
Texto completoDas, Ravindra. "Threat Modeling/Threat Hunting". En The Zero Trust Framework, 113–37. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003392965-5.
Texto completoWeik, Martin H. "threat". En Computer Science and Communications Dictionary, 1780. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19544.
Texto completoBruce, Toni. "Threat". En Terra Ludus, 73–78. Rotterdam: SensePublishers, 2016. http://dx.doi.org/10.1007/978-94-6300-770-2_9.
Texto completoVerschelden, Cia y Kofi Lomotey. "Stereotype Threat and Identity Threat". En Bandwidth Recovery For Schools, 31–35. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003443162-3.
Texto completo"From threat to threat". En The Routledge Companion to UK Counter-Terrorism, 280–98. Routledge, 2012. http://dx.doi.org/10.4324/9780203105573-27.
Texto completo"threat". En Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200985.
Texto completo"threat". En Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200986.
Texto completo"Threat". En Encyclopedia of Child Behavior and Development, 1486. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-79061-9_5941.
Texto completoActas de conferencias sobre el tema "Threat"
Languirand, Eric R., Amee Polk, Michael Kauzlarich, Jacob Buchman y Matthew D. Collins. "Emerging explosive threat analysis for using threat anomaly detection (ThreAD)". En Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XXV, editado por Jason A. Guicheteau, Christopher R. Howle y Tanya L. Myers. SPIE, 2024. http://dx.doi.org/10.1117/12.3016072.
Texto completoClark, K., C. Lee, S. Tyree y J. Hale. "Guiding Threat Analysis with Threat Source Models". En 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381942.
Texto completoCain, Curtis C. y Eileen M. Trauth. "Stereotype threat". En the 2013 annual conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487294.2487305.
Texto completoPramanik, Sarah. "Threat motivation". En 2013 10th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT). IEEE, 2013. http://dx.doi.org/10.1109/cewit.2013.6851346.
Texto completoYskout, Koen, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts y Wouter Joosen. "Threat modeling". En ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377816.3381741.
Texto completoHo, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg y Muye Liu. "Insider Threat". En SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.
Texto completoCasey, Timothy, Patrick Koeberl y Claire Vishik. "Threat agents". En the Sixth Annual Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852728.
Texto completoKohli, Harpreet, Dale Lindskog, Pavol Zavarsky y Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats". En 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.
Texto completoShrivas, Mahendra Kumar, Thomas Yeboah Dean y S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization". En 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.
Texto completoChibueze Brendan, Ahuokpeme y John McCarthy. "Taxonomy of Threat Categorization and Threat Intelligence Platform". En 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 2019. http://dx.doi.org/10.1109/icgs3.2019.8688157.
Texto completoInformes sobre el tema "Threat"
Woodard, Laura, Cynthia K. Veitch, Sherry Reede Thomas y David Patrick Duggan. Categorizing threat : building and using a generic threat matrix. Office of Scientific and Technical Information (OSTI), septiembre de 2007. http://dx.doi.org/10.2172/921121.
Texto completoWebb, Jeff. Cooperative Threat Reduction. Fort Belvoir, VA: Defense Technical Information Center, abril de 1997. http://dx.doi.org/10.21236/ada398063.
Texto completoDuggan, David Patrick. Generic threat profiles. Office of Scientific and Technical Information (OSTI), julio de 2005. http://dx.doi.org/10.2172/882540.
Texto completoKessler, Andrew, Michael Shewfelt, Jennifer Davis, Brian Connett, Jared Chiu-Rourman, Joseph Oravec, Shaunnah Wark, Ling Siew Ng, Seng Chuan Lim y Cheng Lock Chua. Maritime Threat Response. Fort Belvoir, VA: Defense Technical Information Center, junio de 2006. http://dx.doi.org/10.21236/ada462563.
Texto completoFrye, Jason Neal, Cynthia K. Veitch, Mark Elliot Mateski, John T. Michalski, James Mark Harris, Cassandra M. Trevino y Scott Maruoka. Cyber threat metrics. Office of Scientific and Technical Information (OSTI), marzo de 2012. http://dx.doi.org/10.2172/1039394.
Texto completoMcKinney, Terry L., Timothy E. Moore, Robert E. Bender, Steven I. Case, Cheryl L. Snyder, Karen A. Ulatowski, David P. Goodykoontz, Kevin G. Burrowes, Breon E. Dehoux y Theresa L. Tameris. Cooperative Threat Reduction: Contracts Awarded by the Defense Threat Reduction Agency in Support of the Cooperative Threat Reduction Program. Fort Belvoir, VA: Defense Technical Information Center, agosto de 2004. http://dx.doi.org/10.21236/ada433189.
Texto completoSingh, Surinder Paul, Philip W. Gibbs y Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), marzo de 2014. http://dx.doi.org/10.2172/1126557.
Texto completoSingh, Surinder Paul, Philip W. Gibbs y Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), marzo de 2014. http://dx.doi.org/10.2172/1126558.
Texto completoPatrick Treado, Oksana Klueva y Jeffrey Beckstead. Airborne Particulate Threat Assessment. Office of Scientific and Technical Information (OSTI), diciembre de 2008. http://dx.doi.org/10.2172/966354.
Texto completoYoung, Byron J. Terrorism: Analyzing the Threat. Fort Belvoir, VA: Defense Technical Information Center, abril de 1998. http://dx.doi.org/10.21236/ada344982.
Texto completo