Tesis sobre el tema "Threat"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Threat".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Eckert, Christine. "Stereotype Threat". Ruprecht-Karls-Universität, 2014. https://ul.qucosa.de/id/qucosa%3A15350.
Texto completoEckert, Christine. "Stereotype Threat". Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-219437.
Texto completoDunning, John Paul. "Bluetooth Threat Taxonomy". Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.
Texto completoMaster of Science
Taylor, Emma. "A veiled threat". Thesis, Taylor, Emma (2011) A veiled threat. Honours thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/41700/.
Texto completoZahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Texto completoOlandersson, Sandra y Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Texto completoFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Texto completoDissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
Lee, Jong-Eun Roselyn. ""A threat on the net" : stereotype threat in avatar-represented online groups /". May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Texto completoMunshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model". Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.
Texto completoRoberts, Marianne. "Threat processing in fibromyalgia". Thesis, University of Southampton, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617820.
Texto completoLorinczi, L. "Globalization progress or threat". Thesis, Видавництво СумДУ, 2004. http://essuir.sumdu.edu.ua/handle/123456789/23032.
Texto completoLorinczi, L. "Globalization progress or threat". Thesis, Видавництво СумДУ, 2004. http://essuir.sumdu.edu.ua/handle/123456789/23035.
Texto completoVestlund, Christian. "Threat Analysis on Vehicle Computer Systems". Thesis, Linköping University, Department of Computer and Information Science, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661.
Texto completoVehicles have been around in our society for over a century, until recently they have been standalone systems. With increased amounts of initiatives to inter-network vehicles to avoid accidents and reduce environmental impact the view of a vehicle as a standalone system needs to be reconsidered. Networking and cooperation between vehicles requires that all systems and the information therein are trustworthy. Faulty or malicious vehicle systems are thus not limited to only affecting a single vehicle but also the entire network. The detection of anomalous behavior in a vehicle computer system is therefore of importance. To improve the vehicle systems we strive to achieve security awareness within the vehicle computer system. As a first step we will identify threats toward the vehicle computer system and what has been done to address them.
We perform a threat analysis consisting of fault trees and misuse cases to identify the threats. The fault trees provide away to connect the threats found with vehicle stakeholders' goals. The connection between stakeholder goals and threat highlights the need for threat mitigation.
Several research initiatives are discussed to find out what has been done to address the identified threats and to find the state of the research for security in vehicle computer system.
Lastly, an error model for the Controller Area Network (CAN) is proposed to model the consequences of threats applied to the CAN bus.
Gupta, Shikha, Shijo Joseph y Deepu Sasidharan. "The Challenges in Leveraging Cyber Threat Intelligence". Thesis, Högskolan i Halmstad, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44800.
Texto completoDouglas, Michael L. Gray Arlene J. "The Warfighters' Counterspace Threat Analysis (WCTA) : a framework for evaluating counterspace threats /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384609.
Texto completoDouglas, Michael L. y Arlene J. Gray. "The Warfighters' Counterspace Threat Analysis (WCTA): a framework for evaluating counterspace threats". Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7830.
Texto completoThe authors present an evolutionary approach to evaluating the counterspace threat in support of Department of Defense (DoD) decision-makers. The goal is to present a process that decision-makers can readily utilize to accurately assess the level of the counterspace threat originating within their Area of Responsibility (AOR). It is particularly useful as the state of affairs change within the AOR. The authors examine the necessity to utilize space to achieve information dominance, strengths and weaknesses of present Counterspace Threat Models, DoD's increasing dependence on space assets, DoD's reliance on commercial space systems to meet future requirements, and potential adversaries' awareness of the dependence of U.S. forces on space systems. Conclusions stress that the threat is comprised of two essential elements an opponent's willingness to employ a counterspace tactic (their intent) and the opponent's ability to develop the necessary tools to employ a counterspace tactic (their capability). The authors believe that the "intent" component of the threat changes more rapidly than the present models can easily accommodate. Therefore, a process, such as the one presented in this thesis, will enable DoD decision-makers that experience many of the changes of 'intent' first hand to rapidly and accurately assess the threat as the condition changes within the AOR
Mitchell, Melanie. "No idle threat: Precursors to action in threateners with mental illness". Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/180839/1/Melanie_Mitchell_Thesis.pdf.
Texto completoKinkela, Jessica H. "Diagnosis Threat in Mild Traumatic Brain Injury". Ohio University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1223597555.
Texto completoElizaga, Ronald A. "ELICITING STEREOTYPE CHALLENGE AND STEREOTYPE THREAT EFFECTS WITHIN THE CONTEXT OF WOMEN’S MATH PERFORMANCE". Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1132057268.
Texto completoLiliengren, Theodor y Paul Löwenadler. "Threat hunting, definition and framework". Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-36759.
Texto completoGopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures". Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.
Texto completoYeung, Nai Chi Psychology Faculty of Science UNSW. "Stereotype threat behind the wheel". Awarded by:University of New South Wales. School of Psychology, 2006. http://handle.unsw.edu.au/1959.4/26242.
Texto completoRaymont, Paul David. "An idle threat, epiphenomenalism exposed". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0005/NQ41289.pdf.
Texto completoBlack, Alan. "Managing the aviation insider threat". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5039.
Texto completoApproved for public release; distribution is unlimited
Despite enhancements to aviation security since September 11, 2001, there remain vulnerabilities from employees at airports. This threat results from airline/airport employees that have access to sensitive and restricted areas during the normal course of their required duties. This thesis evaluates the threat and the measures in place to prevent attacks from aviation insiders. In addition, it evaluates a measure commonly referred to as 100 percent employee screening. Finally, the thesis derives recommendations to enhance the current methods to reduce the vulnerability, as well as proposes additional measures to further reduce the threat from aviation insiders.
Woods, Matthew E. "The threat of radiological terrorism". Thesis, Monterey, California. Naval Postgraduate School, 1996. http://hdl.handle.net/10945/9072.
Texto completoWMD terrorism is a new concern. The United States is preparing for the possibility of terrorist attacks involving chemical, biological, and nuclear weapons, but the scope of these preparations is too narrow. This thesis argues that radiological devices are also viable weapons of mass destruction for terrorism. Radiological weapons are not nuclear explosives, they are designed to disperse radioactive material over an area by mechanical means or conventional explosives. The potential for radiological terrorism depends upon access to the required nuclear materials and the motivations for terrorists to use radiological weapons. Rasiological weapons can use non-lethal grade nuclear material which is widely accessible throughout the world. The materials is under a spectrum of physical security systems with little accountability and verification. Radiological weapons can further terrorist objectives because they can be used to contaminate individuals without producing the immediate and catastrophic damage normally associated with WMD. This prospect of contamination is enough to incite the public's fear of the nuclear unknown or nuclear phobia. To counter radiological terrorism, the U.S. government should expand indication and warning through efforts to maximize the intelligence community's human intelligence assets and exploit open source collection
Inglis, Sheila M. C. "Inabstinent women : the drunken threat". Thesis, University of Glasgow, 1993. http://theses.gla.ac.uk/3196/.
Texto completoDavidson, Madeiene E. "Alzheimer's Disease: The Triple Threat". Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1287.
Texto completoCrassa, Marina. "Conceptualising the threat of cancer". Thesis, University of Surrey, 1989. http://epubs.surrey.ac.uk/843869/.
Texto completoHinsenkamp, Lucas Daniel. "Compensatory Bolstering: Uncertainty or Threat?" The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1433501651.
Texto completoCrawford, Bonni. "Social reward and threat processing". Thesis, Cardiff University, 2015. http://orca.cf.ac.uk/90984/.
Texto completoCicero, David. "Does ego threat increase paranoia?" Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/5019.
Texto completoThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on May 11, 2009) Includes bibliographical references.
Connor, Robert J. "Defeating the modern asymmetric threat". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FConnor.pdf.
Texto completoCarroll, Kevin Sean. "Language Maintenance in Aruba and Puerto Rico: Understanding Perceptions of Language Threat". Diss., The University of Arizona, 2009. http://hdl.handle.net/10150/195400.
Texto completoMusumeci, Maria D. "COVID-19 Threat Perceptions and Voting in the 2020 Presidential Election". University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628025640916147.
Texto completoWessman, Love y Niklas Wessman. "Threat modeling of large-scale computer systems : Implementing and evaluating threat modeling at Company X". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280099.
Texto completoHotmodellering är ett växande område inom cybersäkerhet. När datorsystem växer och blir mer komplicerade, så blir kunskapen om hur man modellerar och skyddar systemen allt viktigare. Hotmodellering är ett verktyg väl anpassat till denna uppgift. I den här rapporten ligger fokuset på att höja cybersäkerheten på Företag X och att bidra till utvecklingen av hotmodellering, vilket i sig bidrar till att stärka forskningen kring cybersäkerhet. Den huvudsakliga frågan som undersöks är vilka resultat som kan uppnås med en implementation av KTH Threat Modeling Method på specifika system hos Företag X. Frågan besvaras genom att implementera metoden på de specificerade systemen. Därefter används erfarenheten av utvecklingen och det framtagna resultatet till att evaluera hotmodellerings metoden. Den framtagna modellen pekar på att den största risken i de undersökta systemen hos Företag X är deras internetanslutna rökdetektorer och smarta mätare som mäter vatten- och elförbrukning. De rekommendationer som ges är bland annat att skydda sig mot SQL-injektionerna genom att hålla systemen uppdaterade och att validera indata. De huvudsakliga intrycken som erhölls från att implementera hotmodelleringsmetoden på Företag X är att metoden är lätt att använda, lära sig, och förstå. Ett annat resultat är att ju mer information hotmodelleraren har kring systemen som utforskas, desto mer exakt kan hotmodellen bli. Metoden är idealiskt lämpad för renodlad, sammansluten mjukvara, snarare än att modellera flera icke-sammanslutna system i en och samma iteration av metoden, vilket är vad denna rapport gör. För att förenkla utlärningsprocessen av metoden så kan en omfattande skriven resurs som exempelvis en bok vara till god hjälp. För att förbättra själva metoden föreslås integration av automatiserade attacksimulerings- och modelleringsverktyg. The KTH Threat Modeling Method är en iterativ process. Modellen kan och bör göras bättre genom att kontinuerligt iterera över arbetet flera gånger, där modellens detaljrikhet ökas för varje iteration. Det som presenteras i denna rapport är första iterationen av denna process. Innebörden av resultaten från denna rapport visar att även om hotmodelleringsmetoden redan är en mogen metod som kan producera meningsfulla hotmodelleringsresultat, finns det fortfarande vissa bitar som kan förbättras eller läggas till, vilket enligt författarna skulle öka metodens styrka i allmänhet.
Liekweg, Joseph R. "An Analysis of Competing Stereotype Threat Theories". Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/cmc_theses/787.
Texto completoIsgrigg, Adrienne L. "Diagnosis Threat and Cognitive Performance During Pregnancy". Ohio University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1282334665.
Texto completoSandén, Oscar. "Threat Management in Agile Organisations : Using the Results of a Threat Analysis in Agile Software Development". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-364635.
Texto completoNadler, Joel T. "Positive stereotype threat in social groups /". Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1240700731&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Texto completoNagaraj, Rajeev. "Threat modeling of para-virtualized environments". Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5192.
Texto completoThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
Young, Pectro Paula L. "Complacency: a threat to homeland security?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42760.
Texto completoThis thesis presents an unconventional approach to addressing a threat to homeland security by focusing on complacency through the lens of human factors and complexity. This approach requires a paradigm shift. In addition to focusing on external threats from enemies who wish to do this nation harm, and building capabilities to prepare for disasters, it is also necessary to look internally to the behaviors, attitudes, and states of mind of people within homeland security organizations to optimize the success of this country’s efforts. This thesis draws from human factors science, folk science and folk psychology, complexity theory, homeland security doctrine, psychology and biology reference works, and applied research to develop a concept of complacency for the homeland security discipline. The hypothesis is that a clear definition may lead to actionable, observable measures to mitigate it. The research concludes that complacency is more commonly used as a proverbial threat than an actionable threat, but reveals a plethora of future research opportunities for a human-factors approach to addressing threats of this nature.
Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat". Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Texto completoMalicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of the damage they cause there are indications that the seriousness of insider incidents are underappreciated as threats by management. The purpose of this research was to investigate who constitutes MI threats, why and how they initiate attacks, the extent to which MI activity can be modeled or predicted, and to suggest some risk mitigation strategies. The results reveal that addressing the Malicious Insider threat is much more than just a technical issue. Dealing effectively with the threat involves managing the dynamic interaction between employees, their work environment and work associates, the systems with which they interact, and organizational policies and procedures. Techniques for detecting and mitigating the threat are available and can be effectively applied. Some of the procedural and technical methods include definition of, follow through, and consistent application of corporate, and dealing with adverse events indigenous to the business environment. Other methods include conduct of a comprehensive Malicious Insider risk assessment, selective monitoring of employees in response to behavioral precursors, minimizing unknown access paths, control of the organization's production software baseline, and effective use of peer reporting.
Keywords: Cybersecurity, Professor Paul Pantani, CERT, insider, threat, IDS, SIEMS. FIM, RBAC, ABAC, behavioral, peer, precursors, access, authentication, predictive, analytics, system, dynamics, demographics.
Ueki, Chikako. "The rise of "china threat" arguments". Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37435.
Texto completoVita.
Includes bibliographical references (v. 2, p. 483-517).
The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise of "China threat" arguments occurred in the United States and Japan because of a convergence of several factors, the most important of which was the increase of China's relative power after the Cold War. The distribution of power among states strongly affects their intentions and military capabilities. The study introduces and suggests the importance of the strategic safety-net in shaping threat perception. A strategic safety-net emerges when state's survival depends on cooperation with another state. When the strategic safety-net exists, states suppress self-interested behavior and the ally's intentions are perceived as benign. Interviews with former government officials in the United States and Japan confirmed that strategic necessity restrained U.S. and Japanese behavior towards China during the Cold War and limited suspicion of China. The fraying of the strategic safety-net led to the advent of "China threat" arguments.
(cont.) The main difference between the United States and Japan was that whereas in the U.S. case threat perception was shaped by a primacy strategy, Japan had to face a preponderant United States and a rising China at the same time. "China threat" arguments were suppressed in Japan while Japan was unsure about its relationship with the United States. The consolidation of Japan's relationship with the United States led to a surge of"China threat" arguments in Japan in 2000. The interests of domestic organizations were not the major cause of the initial rise of "China threat" arguments. The relevant organizations, including the military services, made "China threat" arguments only after they gained currency within the society. The study also finds that China's undemocratic nature did not independently cause the perception of threat.
by Chikako Kawakatsu Ueki.
Ph.D.
Aljazairi, Sena. "ROBOT JOURNALISM: : THREAT OR AN OPPORTUNITY". Thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-50892.
Texto completoBates, Tyler Alexander. "Usutu Virus: An Emerging Arbovirus Threat". Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/102268.
Texto completoMaster of Science
Usutu virus (USUV) is an emerging mosquito-borne virus that was first isolated from a mosquito in 1959 in South Africa, and since then, has become a major problem throughout Africa and Europe causing acute to severe infection in dozens of patients. Additionally, this virus is causing massive die-offs in Eurasian blackbird populations. This is particularly problematic because birds play a critical role in ecosystems as they act as forms of pest control, pollinators, and seed dispersers. Depletion of these species could lead to an imbalance and, eventually, collapse of our natural ecosystem. Additionally, there is a growing concern of USUV making its way into the United States, following a similar track of emergence to WNV's introduction in New York in 1999 and its subsequent spread throughout the states. WNV's introduction to the United States was detrimental to native bird populations and humans, and has caused tens of thousands of infections and thousands of deaths since this introduction. Research has shown USUV causes similar disease symptoms to WNV. The self-limiting illness from these viruses typically includes fever and rashes but some infections can result in more severe cases causing inflammation of the brain and surrounding areas. Like many other prominent mosquito-borne viruses, there is no specific treatment or vaccine for WNV or USUV. Because USUV is so closely related to WNV, and their similar characteristics may point towards similar emergence in the United States, it is essential to garner more information on USUV. The overall goal of this thesis was to establish a reliable tool(s) for further characterization of USUV and demonstrate the potential for USUV emergence in the United States. We first developed molecular tools, known as viral clones, that are valuable to the scientific community which allows the manipulation of USUV genetic material to perform further downstream studies. Our objective for this initial study was to create a molecular tool that would behave similarly to their natural, or "parental", virus. The results from this study suggest we have successfully produced these tools. Furthermore, we sought to determine the potential for field-caught mosquitoes from Southwest Virginia, USA to transmit a recently isolated strain of USUV. These data suggest that while these mosquitoes do have the ability to become infected with USUV, they have a limited potential to transmit this virus to animal hosts. Altogether, these studies have allowed us to expand our knowledge on USUV's potential emergence in the United States and develop powerful tools to continue this essential research.
Білопільська, Олександра Олександрівна, Александра Александровна Белопольская y Oleksandra Oleksandrivna Bilopilska. "Genetic modified products: salvation or threat". Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/8124.
Texto completoKing, Kenya Latonya. "Stereotype Threat and Survey Response Bias". Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/50814.
Texto completoPh. D.
McCormick, Regina Ann. "Stereotype Threat and Racial Identity Attitudes". Miami University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=miami1123618206.
Texto completoKim, Dae Wook. "Data-Driven Network-Centric Threat Assessment". Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.
Texto completoChudoba, Lubomír. "Generic Substitution: From Threat To Opportunity". Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-142296.
Texto completo