Artículos de revistas sobre el tema "Threat"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Threat".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kiely, P. y C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (abril de 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.
Texto completoHamad, Mohammad y Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study". Information 11, n.º 5 (19 de mayo de 2020): 273. http://dx.doi.org/10.3390/info11050273.
Texto completoKappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald y Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat". Clinical Psychological Science 9, n.º 3 (24 de marzo de 2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.
Texto completoMUGISHA, ARTHUR R. y SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda". Environmental Conservation 31, n.º 3 (septiembre de 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.
Texto completoSandy, Djoko Andoko, Poppy Setiawati Nurisnaeny y Mira Murniasari. "The Threat of Social Network Games in Indonesia". Borneo Educational Journal (Borju) 5, n.º 2 (26 de agosto de 2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.
Texto completoBedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang y Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management". ACM SIGSOFT Software Engineering Notes 38, n.º 1 (23 de enero de 2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.
Texto completoMuhammed, Khaleel, Aavudai Anandhi, Gang Chen y Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, n.º 20 (12 de octubre de 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Texto completoMuhammed, Khaleel, Aavudai Anandhi, Gang Chen y Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, n.º 20 (12 de octubre de 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Texto completoRiek, Blake M., Eric W. Mania y Samuel L. Gaertner. "Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review". Personality and Social Psychology Review 10, n.º 4 (noviembre de 2006): 336–53. http://dx.doi.org/10.1207/s15327957pspr1004_4.
Texto completoSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities". Actual problems of innovative economy, n.º 3 (30 de mayo de 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Texto completoStephan, Cookie White, Walter G. Stephan, Katherine M. Demitrakis, Ann Marie Yamada y Dennis L. Clason. "Women's Attitudes Toward Men: an Integrated Threat Theory Approach". Psychology of Women Quarterly 24, n.º 1 (marzo de 2000): 63–73. http://dx.doi.org/10.1111/j.1471-6402.2000.tb01022.x.
Texto completoWang, Guan, Lian Ma, Lili Wang y Weiguo Pang. "Independence Threat or Interdependence Threat? The Focusing Effect on Social or Physical Threat Modulates Brain Activity". Brain Sciences 14, n.º 4 (9 de abril de 2024): 368. http://dx.doi.org/10.3390/brainsci14040368.
Texto completoDelgado, Ana R. y Gerardo Prieto. "Stereotype threat as validity threat: The anxiety–sex–threat interaction". Intelligence 36, n.º 6 (noviembre de 2008): 635–40. http://dx.doi.org/10.1016/j.intell.2008.01.008.
Texto completoLamarche, Larkin, Brianne Ozimok, Kimberley L. Gammage y Cameron Muir. "Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men". American Journal of Men's Health 11, n.º 6 (11 de septiembre de 2017): 1791–803. http://dx.doi.org/10.1177/1557988317723406.
Texto completoD, KHOBE, AKOSIM C y KWAGA B.T. "SUSCEPTIBILITY TO THREATS AND THREAT SEVERITY OF ADAMAWA RANGELANDS, NIGERIA". JOURNAL OF ADVANCES IN AGRICULTURE 5, n.º 2 (8 de enero de 2016): 698–705. http://dx.doi.org/10.24297/jaa.v5i2.5084.
Texto completoFarooqui, Muhammad Najmul Islam, Junaid Arshad y Muhammad Mubashir Khan. "A Layered Approach to Threat Modeling for 5G-Based Systems". Electronics 11, n.º 12 (8 de junio de 2022): 1819. http://dx.doi.org/10.3390/electronics11121819.
Texto completoDyer, Rebecca L., Nicklaus R. Herbst, Whitney A. Hintz y Keelah E. G. Williams. "Personal relevance affects the perceived immorality of politically-charged threats". PLOS ONE 18, n.º 12 (29 de diciembre de 2023): e0296177. http://dx.doi.org/10.1371/journal.pone.0296177.
Texto completoGriffin, Renee. "Searching for Truth in the First Amendment's True Threat Doctrine". Michigan Law Review, n.º 120.4 (2022): 721. http://dx.doi.org/10.36644/mlr.120.4.searching.
Texto completoSylvester, F. Ley. "Mobile Device Users’ Susceptibility to Phishing Attacks". International Journal of Computer Science and Information Technology 14, n.º 1 (28 de febrero de 2022): 1–18. http://dx.doi.org/10.5121/ijcsit.2022.14101.
Texto completoSinclair, Samantha, Artur Nilsson y Jens Agerström. "Tolerating the intolerant: Does realistic threat lead to increased tolerance of right-wing extremists?" Journal of Social and Political Psychology 10, n.º 1 (16 de marzo de 2022): 35–47. http://dx.doi.org/10.5964/jspp.8017.
Texto completoDervišević, Tarik, Sabina Baraković y Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows". B&H Electrical Engineering 14, n.º 2 (1 de diciembre de 2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Texto completoGause, F. Gregory. "Threats and Threat Perceptions in the Persian Gulf Region". Middle East Policy 14, n.º 2 (junio de 2007): 119–24. http://dx.doi.org/10.1111/j.1475-4967.2007.00302.x.
Texto completoMARTINEZMARTINEZ, R. y A. DIAZFERNANDEZ. "Threat Perception: New Risks, New Threats and New Missions". Contributions to Conflict Management, Peace Economics and Development 4 (2007): 129–60. http://dx.doi.org/10.1016/s1572-8323(07)04006-4.
Texto completoBeering, Peter S. "Threats on Tap: Understanding the Terrorist Threat to Water". Journal of Water Resources Planning and Management 128, n.º 3 (mayo de 2002): 163–67. http://dx.doi.org/10.1061/(asce)0733-9496(2002)128:3(163).
Texto completoLi, XiaoHong, Ke He, Zhiyong Feng y Guangquan Xu. "Unified threat model for analyzing and evaluating software threats". Security and Communication Networks 7, n.º 10 (5 de julio de 2012): 1454–66. http://dx.doi.org/10.1002/sec.599.
Texto completoSmyth, Aidan P. J., Kimberley L. Gammage, Larkin Lamarche y Cameron Muir. "Examining University Men’s Psychobiological and Behavioral Response-Recovery Profile From a Social-Evaluative Body Image Threat". American Journal of Men's Health 14, n.º 2 (marzo de 2020): 155798832091083. http://dx.doi.org/10.1177/1557988320910831.
Texto completoGuérin, Bastien. "Threat". Pleiades: Literature in Context 44, n.º 1 (marzo de 2024): 119. http://dx.doi.org/10.1353/plc.2024.a926506.
Texto completoSemenenko, O., Y. Dobrovolsky, I. Tselishchev, V. Ivanov, Т. Akinina y V. Dubovyi. "ON DETERMINATION OF THREATS TO THE NATIONAL SECURITY OF UKRAINE FROM THE UNDERWATER SPACE". Collection of scientific works of Odesa Military Academy 2, n.º 14 (25 de enero de 2021): 187–92. http://dx.doi.org/10.37129/2313-7509.2020.14.2.187-192.
Texto completoMichalak, Nicholas M., Oliver Sng, Iris M. Wang y Joshua Ackerman. "Sounds of sickness: can people identify infectious disease using sounds of coughs and sneezes?" Proceedings of the Royal Society B: Biological Sciences 287, n.º 1928 (10 de junio de 2020): 20200944. http://dx.doi.org/10.1098/rspb.2020.0944.
Texto completoVorobieva, O. V. y F. V. Nikolai. "Sociocultural Threats in the State Discourse of Imperial, Soviet, and Post-Soviet Russia: Strategies of Representation". Uchenye Zapiski Kazanskogo Universiteta. Seriya Gumanitarnye Nauki 163, n.º 6 (2021): 86–99. http://dx.doi.org/10.26907/2541-7738.2021.6.86-99.
Texto completoSuhas, Kelkar Siddhi. "Evaluation of Threat Models". International Journal for Research in Applied Science and Engineering Technology 11, n.º 3 (31 de marzo de 2023): 809–13. http://dx.doi.org/10.22214/ijraset.2023.49311.
Texto completoWąsowicz, Grażyna. "COVID-19 pandemic and pollution of the environment – threat perception, willingness to incur economic costs, psychological resources, and behaviors". Przegląd Psychologiczny 66, n.º 2 (17 de diciembre de 2023): 171–88. http://dx.doi.org/10.31648/przegldpsychologiczny.9807.
Texto completoLv, Huiying, Yuan Zhang y Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph". Cybernetics and Information Technologies 13, Special-Issue (1 de diciembre de 2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Texto completoIsokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain". Teisė 122 (30 de marzo de 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Texto completoNaaz, Farah, Lindsay K. Knight y Brendan E. Depue. "Explicit and Ambiguous Threat Processing: Functionally Dissociable Roles of the Amygdala and Bed Nucleus of the Stria Terminalis". Journal of Cognitive Neuroscience 31, n.º 4 (abril de 2019): 543–59. http://dx.doi.org/10.1162/jocn_a_01369.
Texto completoSharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand y Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment". Electronics 10, n.º 15 (31 de julio de 2021): 1849. http://dx.doi.org/10.3390/electronics10151849.
Texto completoKoper-Staszowska, Wioletta. "Security versus Threat – Interrelations". ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, n.º 3 (30 de octubre de 2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Texto completoSaddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim y Aprina Handayani. "Sniffing and Spoofing in Computer Security". International Journal of Integrative Sciences 2, n.º 6 (30 de junio de 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Texto completoBattisti, Corrado, Marisa Perchinelli, Sharon Vanadia, Pietro Giovacchini y Letizia Marsili. "Monitoring Effectiveness of an Operational Project on Two Threatened Landbirds: Applying a Before–After Threat Analysis and Threat Reduction Assessment". Land 12, n.º 2 (12 de febrero de 2023): 464. http://dx.doi.org/10.3390/land12020464.
Texto completoPeterson, Jordan B. y Colin G. DeYoung. "Metaphoric threat is more real than real threat". Behavioral and Brain Sciences 23, n.º 6 (diciembre de 2000): 992–93. http://dx.doi.org/10.1017/s0140525x00784020.
Texto completoEluwa, Jumoke, Patrick Omorovan, Dipo Adewumi y Oluwafunmilayo Ogbeide. "The Evolving Threat Landscape: How Cyber Threat Intelligence Empowers Proactive Defenses against WannaCry Ransomware". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n.º 2 (3 de abril de 2024): 403–11. http://dx.doi.org/10.32628/cseit243648.
Texto completoPopaja, Nejla, Sabina Baraković y Jasmina Baraković Husić. "Analysis of Threats for Ambient Assisted Living (AAL) Wireless Sensor Network (WSN)-Based System". B&H Electrical Engineering 15, n.º 2 (1 de diciembre de 2021): 31–39. http://dx.doi.org/10.2478/bhee-2021-0015.
Texto completoHolmes IV, Oscar, Marilyn V. Whitman, Kim S. Campbell y Diane E. Johnson. "Exploring the social identity threat response framework". Equality, Diversity and Inclusion: An International Journal 35, n.º 3 (18 de abril de 2016): 205–20. http://dx.doi.org/10.1108/edi-08-2015-0068.
Texto completoAththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA". Edukasi IPS 5, n.º 2 (30 de agosto de 2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.
Texto completoUenal, Fatih. "Disentangling Islamophobia: The differential effects of symbolic, realistic, and terroristic threat perceptions as mediators between social dominance orientation and Islamophobia". Journal of Social and Political Psychology 4, n.º 1 (7 de abril de 2016): 66–90. http://dx.doi.org/10.5964/jspp.v4i1.463.
Texto completoVan Severen, Ruben, Arne Roets, Delphine Van Muylem, Tessa Haesevoets, Alain Van Hiel y Bram Wauters. "Democratic and Authoritarian Government Preferences in Times of Crisis". Social Psychology 55, n.º 1 (enero de 2024): 37–50. http://dx.doi.org/10.1027/1864-9335/a000538.
Texto completoRahmat, Wahyudi. "BAHASA ANCAMAN DALAM TEKS KABA SABAI NAN ALUIH BERBASIS PENDEKATAN LINGUISTIK FORENSIK". JURNAL ARBITRER 2, n.º 1 (29 de abril de 2015): 81. http://dx.doi.org/10.25077/ar.2.1.81-97.2015.
Texto completoKhan, Muhammad Salman, Rene Richard, Heather Molyneaux, Danick Cote-Martel, Henry Jackson Kamalanathan Elango, Steve Livingstone, Manon Gaudet y Dave Trask. "Cyber Threat Hunting". International Journal of Cognitive Informatics and Natural Intelligence 15, n.º 4 (1 de octubre de 2021): 1–23. http://dx.doi.org/10.4018/ijcini.20211001.oa9.
Texto completoMartins, Cláudio y Ibéria Medeiros. "Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy". ACM Transactions on Privacy and Security 25, n.º 3 (31 de agosto de 2022): 1–39. http://dx.doi.org/10.1145/3530977.
Texto completoMaris, Ladislav, Zuzana Zvakova, Katarina Kampova y Tomas Lovecek. "The Influence of Threat Development on the Failure of the System’s Symmetry". Systems 9, n.º 4 (20 de octubre de 2021): 74. http://dx.doi.org/10.3390/systems9040074.
Texto completo