Дисертації з теми "Attack Investigation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Attack Investigation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Fang, Pengcheng. "REPTRACKER:TOWARDS AUTOMATIC ATTACK INVESTIGATION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1550696995596089.
Повний текст джерелаVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Повний текст джерелаMathre, John Mark. "Computational investigation of incompressible airfoil flows at high angles of attack." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/22965.
Повний текст джерелаCebeci's viscous/inviscid interaction program was applied to the analysis of steady, two dimensional, incompressible flow past four airfoils, the NACA 66₃-018, 0010 (Modified), 4412 and the Wortmann FX 63-137. Detailed comparisons with the available experimental results show that the essential features are correctly modelled, but that significant discrepancies are found in regions of flow separations.
http://archive.org/details/computationalinv00math
Lieutenant, United States Navy
Tait, Sean William. "An investigation of fore-body aerodynamics during the velocity vector roll." Thesis, University of the West of Scotland, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.265929.
Повний текст джерелаChan, Yik-Kwan Eric, and 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Повний текст джерелаJhangiani, Rajiv Sunil. "Processing terror : an investigation into the immediate and short-term psychological effects of a terrorist attack." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2780.
Повний текст джерелаBrueckner, Rene. "Accelerating the thaumasite form of sulfate attack and an investigation of its effects on skin friction." Thesis, University of Birmingham, 2008. http://etheses.bham.ac.uk//id/eprint/176/.
Повний текст джерелаHovmark, Olle, and Emma Schüldt. "Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280102.
Повний текст джерелаCyberattacker mot alla typer av system är ett växande problem i samhället. Eftersom Mac-operativsystemen blir allt vanligare, blir attackerna mot dem också vanligare. Probabilistiska attackgrafer är ett sätt att modellera och visualisera cyberattacker. Meta Attack Language är ett språk som kan användas för att skapa domänspecifika språk som i sin tur kan användas för att modellera en cyberattack på den specifika domänen med en probabilistisk attackgraf. Denna rapport undersöker hur Meta Attack Language kan utvidgas så att det kan användas för att skapa attackgrafer som innehåller digitala forensiska bevis, genom att undersöka attacker mot Mac- operativsystem där bevis i form av property-list-filer har lämnats. MITRE ATT&CK-matrisen är en kunskapsbas med information om cyberattacker. En studie av denna matris gjordes för att ta reda på vilka olika typer av bevis som har hittats efter attacker på ett Mac-operativsystem samt för att motivera varför denna rapport fokuserar på bevis i form av property-list-filer. En studie av grå litteratur gjordes sedan för att undersöka olika typer av attacker som har lämnat bevis i form av property-list-filer. Studierna visade att det finns en mängd bevis som kan lämnas från ett angrepp på ett Mac-operativsystem och att de flesta bevis i form av property-list-filer användes av attackeraren för att göra attacken tålig mot sådant som omstart av systemet. De visade också att property-list-filerna ofta placerades i rotkatalogen i filsystemet. Studierna visade också att motståndaren ofta försökte dölja filerna genom att ge dem namn som vanligtvis används på ett Mac-operativsystem. Efter studierna genomförts skapades en lista med krav som måste uppfyllas av en utvidgning av Meta Attack. Denna lista baserades på resultaten från studierna och inkluderade krav som säger att det till exempel måste finnas sätt att uttrycka namnet och platsen för en fil, metoder som angriparen använder för att undvika upptäckt, samband mellan olika typer av bevis och samband mellan bevis och attacksteg.
Waring, Howard Linton. "An investigation into the nature and response to treatment of panic attack symptoms in general practice attenders." Thesis, University of Aberdeen, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.277490.
Повний текст джерелаSommers, John Douglas. "An experimental investigation of support strut interference on a three-percent fighter model at high angles of attack." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25926.
Повний текст джерелаDe, Oliveira Neto Pedro Jose. "An Investigation of Unsteady Aerodynamic Multi-axis State-Space Formulations as a Tool for Wing Rock Representation." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/29600.
Повний текст джерелаPh. D.
Salemi, Leonardo da Costa, and Leonardo da Costa Salemi. "Numerical Investigation of Hypersonic Conical Boundary-Layer Stability Including High-Enthalpy and Three-Dimensional Effects." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/621854.
Повний текст джерелаÖberg, Fredrik. "Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42294.
Повний текст джерелаHornschuh, Veronica. "A victimological investigation of farm attacks with specific reference to farmers' perceptions of their susceptibility, the consequences of attacks for farmers and the coping strategies applied by them after victimisation." Diss., Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-07282008-094048.
Повний текст джерелаDrozd, Mary R. "Campylobacter jejuni Survival Strategies and Counter-Attack: An investigation of Campylobacter phosphate mediated biofilms and the design of a high-throughput small-molecule screen for TAT inhibition." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1344351339.
Повний текст джерелаThurieau, Nicolas. "Sur la modélisation du tissu cardiaque comme un milieu à microdilatation : une investigation numérique." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0018/document.
Повний текст джерелаBackground: A soft biological tissue is subjected to numerous exchange phenomena and has an extremely complex structural organization. The knowledge of its mechanical behavior is required in many applications ranging from clinical diagnostic to tissue engineering. To achieve this goal, more or less satisfactory approaches are developed. They all seek to take into account in a more or less systematic manner the microstructure of the medium. Assuming that the biological tissue is a particular micromorphic medium (micropolar medium) leads to good results in the case bone tissue. It is therefore likely that the results of this kind will be obtained for other tissues. Our interest is on the heart tissue and the problem of ischemic heart attack. In this context, it seemed that the most appropriate behavior particularization is that of a microdilatation medium. Work done: The work presented in this thesis is essentially numerical. It aims to highlight the features of the response of microdilatation medium to an external mechanical load. This step is essential for the analysis of the experimental results to be conducted in the future. The work also aims to investigate the potentialities of the model with respect to the heart tissue regarding heart attack and the associated loss of the ability to eject sufficient blood volume. The numerical tools for the analysis of such media are in increasing development. We had to develop our own tool based on the LPI-BEM (Local Point Interpolation - Boundary Element Method). Because of the similarity of the associated field equations, the validity of the numerical strategy is assessed in the case of a piezoelectric material. This choice is not innocent because the piezoelectric medium with microdilatation will allow analyzing the case of an electrical solicitation of the tissue. The details of this original numerical approach are given in Chapter 2 of the thesis. Chapter 3 is devoted to the analysis of the robustness of the method and to the peculiarities of the response of a microdilatation medium. The fourth chapter is devoted to the application to the cardiac tissue. By limiting the study to the case of small strains, it is shown that the model is well suited to the representation of the behavior of cardiac tissue. Indeed, considering the left ventricle as a tubular structure, the left ventricle ejection fraction (clinical criterion of the heart failure) is greatly reduced in the presence of an infarcted area. The latter is modeled as a zone with diffuse boundary where the material points have lost their ability to "breath". These results are promising and encourage further investigations in this direction by taking into account the anisotropic nature of the tissue in a geometrically nonlinear context
Abbasi, Saeed. "Investigation of open resolvers in DNS reflection DDoS attacks." Master's thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25802.
Повний текст джерелаDomain Name System (DNS) servers represent key components of Internet networks. Recently, attackers have taken advantage of this service to launch massive Distributed Denial of Service (DDoS) attacks against numerous organizations [1, 2, 3]. This is made possible due to the various vulnerabilities linked to the design, implementation or misconfiguration of the DNS protocol. DNS reflection DDoS attacks are harmful threats for internet users. The goal of this study is to gain a better understanding of DNS reflection DDoS attacks through the investigation of DNS open resolvers around the world. In this context, there is a need for an early phase approach to detect and fingerprint DNS open resolvers. This becomes crucial in the process of investigation. In this thesis, we elaborate on the usage of DNS open resolvers in DNS reflection DDoS attacks. More precisely, the main contribution of our research is as follows : (i) We profile DNS open resolvers, which involves : detecting open resolvers, locating them, fingerprinting their operating system, fingerprinting the type of their connectivity, studying the purpose of their liveness. (ii) We conduct an assessment with respect to DNS open resolvers security and their vulnerabilities. Moreover, we discuss the security features that DNS open resolvers are equipped with, which inadvertently provide the capability to the attackers in order to carry out DNS reflection DDoS attacks. (iii) We present an analysis to demonstrate the association of DNS open resolvers with malware threats.
Stephenson-Huxford, Michael. "Investigating the invisible cord : an analytical autoethnography of first panic attack." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/b36a6cf8-c36f-4361-a3d1-1fe18ff3dab3.
Повний текст джерелаNagy, Gábor, and Kitty Thai. "Investigating Traditional Software Testing Methods for use with the Meta Attack Language." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280103.
Повний текст джерелаHotmodellering av system är ett växande område inom datasäkerhet. Med introduktionen av Meta Attack Language (MAL) av KTH-forskare har behovet av att kunna testa och verifiera korrektheten av sådana modelleringstekniker återigen blivit uppenbart. Det här arbetet undersöker användningen av symbolisk exekvering samt verifieringsverktyg för programmodeller för att bekräfta korrektheten hos de producerade modellerna och deras beteende. Med hjälp av programspråkutvecklare, såväl som en litteraturstudie om de föreslagna test-metoderna, har man dragit slutsatsen att den nuvarande utformningen av MAL gör det svårt att testa det effektivt, och det rekommenderas att ändringar görs för att lösa problemet.
Kimak, Stefan. "An investigation into possible attacks on HTML5 IndexedDB and their prevention." Thesis, Northumbria University, 2016. http://nrl.northumbria.ac.uk/30260/.
Повний текст джерелаHarris, Cheryl A. "U.S. intelligence." [Norfolk, Va.] : Joint Forces Staff College, Joint Advanced Warfighting School, 2006. http://doclib.jfsc.ndu.edu/2006Harris.pdf.
Повний текст джерела"April 14, 2006." Electronic version of original print document. Includes bibliographical references (p. 66-70).
Kalogiannis, Konstantinos. "Investigating Attacks on Vehicular Platooning and Cooperative Adaptive Cruise Control." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292951.
Повний текст джерелаSjälvkörande fordon är en framväxande teknologi med mål att ändra människors framtida inställning till mobilitet. Ett kritiskt steg mot målet är att försäkra sig om att aktörer med ont uppsåt inte kan orsaka olyckor som kan leda till skador eller dödsfall. För närvarande används fordonståg, alltså fordon som samarbetar för att minska bränsleförbrukning och öka körkomfort, i avgränsade miljöer med fokus på att anpassa dessa för verklig användning. Att garantera att fordonet kan köras tillsammans med andra enheter är då inte tillräckligt eftersom dessa system kan bli mål för externa och interna attacker som kan ha förödande konsekvenser. Denna uppsats fokuserar på det senare fallet och undersöker interna datafalsifierings- och frekvensstörningsattacker avsedda att destabilisera fordonståg i syfte att minska deras fördelar eller provocera fram en olycka. Dessa attacker är svåra att urskilja och inkluderar allt från enkla falsifikationsattacker till komplexa attacker som syftar till att kringgå specifika försvarsmekanismer. Med det i åtanke inriktar vi våra experiment mot de manövrar som är en del av fordonstågens grundfunktionalitet och krävs för deras nominella drift. Resultaten av arbetet visar att under fordonstågmanövrar så kan flertalet av de utvärderade attackerna orsaka olyckor och att attacker genom förfalskning av position var speciellt förödande. Vi har även påvisat att en fordonstågsledare med ont uppsåt utgör ett speciellt allvarligt hot mot fordonstågets funktionalitet på grund av dennes unika möjlighet att interagera med alla medlemmar. Attacker under manövrar har visats utgöra ett hot, inte bara mot stabiliteten av formationen, men även mot de grundläggande egenskaperna hos systemet själv såsom att isolera fordonståget från nya medlemmar.
McDaniel, Larry T. III. "An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33451.
Повний текст джерелаMaster of Science
da, Assuncao Gouveia Tuna Maria. "A population-based study of transient neurological attacks : incidence, clinical characteristics, investigation, aetiology and prognosis." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:ad3b3af3-326d-49be-9839-84019b465cc9.
Повний текст джерелаAlhussein, Nawras. "Investigation of the variables that govern user behaviors related to e-crime attacks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79293.
Повний текст джерелаKour, Jawdat, and Hasan Ahmed. "Email attacks : Investigation about the vulnerability of the Swedish organizations against email threats." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97020.
Повний текст джерелаTowner, Laurence. "Investigating the tumour promoting roles of complement membrane attack complex using global gene expression analysis." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/53361/.
Повний текст джерелаBlack, Richard Petrus. "Total reward offerings that attract : an investigation conducted in SMEs." Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/15466.
Повний текст джерелаWright, Joseph H. "An Investigation of a Minimal-Contact Bibliotherapy Approach to Relapse Prevention for Individuals Treated for Panic Attacks." Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/30686.
Повний текст джерелаPh. D.
Lala, Darshan Magan. "An investigation into the prevalence and growth of phishing attacks against South African financial targets." Thesis, Rhodes University, 2016. http://hdl.handle.net/10962/3157.
Повний текст джерелаFerguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate." Thesis, Monterey, California: Naval Postgraduate School, 2012.
Знайти повний текст джерелаCyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
Charlebois, Patricia. "Investigating the viability of establishing detection programs for early detection and warning of an airborne biological weapons attack." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ62010.pdf.
Повний текст джерелаMcClure, Adam Patrick. "Investigation of reactively structured Al/Ni multilayer foils and their applications in high temperature die attach." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8909.
Повний текст джерелаThesis research directed by: Dept. of Material Science and Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Helalat, Seyed Milad. "An Investigation of the Impact of the Slow HTTP DOS and DDOS attacks on the Cloud environment." Thesis, Blekinge Tekniska Högskola, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14754.
Повний текст джерелаFebbraro, Gregorio A. R. "An investigation of the differential effectiveness of bibliotherapy and self-regulatory treatments in individuals with panic attacks." Diss., This resource online, 1997. http://scholar.lib.vt.edu/theses/available/etd-10052007-143700/.
Повний текст джерелаRyland, Nizaam. "Investigating organisational consequences for failing to retain and attract talented employees." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/18184.
Повний текст джерелаENGLISH ABSTRACT: The aim of the study is firstly to determine what the main causes are for employee turnover and turnover intention. Secondly, the study is to investigate the consequences for organisations that are unable to retain or attract talented employees. The data was collected through exit interviews and through personal interviews from the organisation. The sample was taken from a diverse group of individuals consisting of people from all departments in the organisation. In total six departments were considered. The data was categorised into five areas, namely remuneration and benefits, work-life balance, organisational culture, job satisfaction and career development. The data will be presented graphically and then analysed. The literature review was conducted on the categories as categorised from the exit and personal interview data. This was done to compare the literature findings to the data analysis results as established from the exit and personal interview data. The findings suggested that organisational culture was the biggest contributor to employee turnover or turnover intention, followed by career development and job satisfaction. While remuneration and benefits are of some significance, it does not appear to be major contributors.
AFRIKAANSE OPSOMMING: Die doel van die studie is eerstens om die hoofoorsake van werknemer bedankings, sowel as die voorneme van werknemers om organisasies te verlaat, te bepaal. Tweedens, om ondersoek in te stel na die moontlike gevolge vir organisasies wat nie in staat is om werknemers te behou of nuwe talent te lok nie. Inligting vir die studie is deur middel van diensverlatings- en persoonlike onderhoude van die organisasie verkry. 'n Verskeidenheid individue uit ses verskillende departemente het aan die studie deel-geneem. Die inligting is in vyf katagorieë verdeel, naamlik vergoeding en voordele, balans tussen werk en persoonlike lewe, organisasiekultuur, werksbevredeging en loopbaanverbetering. Die data word grafies voorgestel en geanaliseer. Die literatuurstudie is saamgestel in dieselfde vyf katagorieë as die waarin inligting verkry is deur die verskillende onderhoude. Dit is gedoen ten einde die literatuurstudie-bevindings met die data- analise te vergelyk wat deur middel van diensverlatings- en persoonlike onderhoude verkry is. Die studie dui aan dat organisasiekultuur die grootste bydraende faktor is by werknemerbedankings, sowel as by werknemers wat beoog om die organisasies te verlaat. Bykomende bevindings dui op loopbaanverbetering en werksbevrediging. Terwyl vergoeding en voordele 'n faktor is, wys die studie dat dit nie 'n belangrike bydraende faktor is nie.
Wong, Kit-mei, and 黃潔媚. "Investigating the effectiveness of direct instruction of guessing fromcontext for improving English as a second language primary students'word-attack skills." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B3567703X.
Повний текст джерелаLotrionte, Catherine B. "The missing piece why intelligence reform failed after 9/11 /." Connect to Electronic Thesis (ProQuest), 2008. http://0-gateway.proquest.com.library.lausys.georgetown.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3315459.
Повний текст джерелаMushtaq, Wafaa. "Cybersecurity in the Technology Subject from the Swedish Perspective : Investigation, Analysis, and Evaluation Tool." Thesis, KTH, Lärande, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283112.
Повний текст джерелаDetta examensarbete innehåller banbrytande arbete i Sverige vilket bidrar till forskningen om cybersäkerhetsundervisning inom teknikämnet i svenska skolor. Arbetet går i linje med en större strategi från Myndigheten för samhällsskydd och beredskap (MSB) och Europeiska unionen (EU). En diskursanalys utfördes på intervjuerna med fyra svenska experter från MSB, Internetstiftelsen och #290CyberSecurity där intervjufrågorna formulerades runt tre axlar; den första axeln var cybersäkerhetsinnehållet som är riktad mot unga individer, den andra axeln var experternas syn på undervisning i cybersäkerhet som börjar från grundskolorna, och den tredje axeln gällde de plattformar eller verktyg som kunde användas i cybersäkerhetundervisning samt vad experternas uppfattning om dem är. Analysen av intervjuer resulterade i sex olika koder vilket speglar experters åsikter. Innehållsanalys utfördes också på information från experternas organisationer. Det var totalt 14 säkerhetsdokument och rapporter som resulterade i en innehållsram med tio cybersäkerhetsområden. Alla de tio områdena är relaterade till nyckelorden som finns i styrdokumenten för teknikämnena i kursplanen för årskurs 7-9 och ämnesplanen för Teknik 1. Aktuella cyberattacker och risker som hotar unga elever analyserades vidare under varje område för att begränsa innehållsramen och anpassa den för unga elever. Ett nytt online utvärderingsverktyg utvecklades sedan för att bedöma cybersäkerhetsrespons och attityd hos de unga eleverna. Formuleringen av frågorna inspirerades av SANS cybersäkerhetsmedvetenhetsundersökning och var baserad på de tio cybersäkerhetsområdena som kategoriseras i detta examensarbete samt de olika scenarierna för risker och cybersäkerhetsattacker som hotar unga elever. Domain Sampling Theory (DST) och scenariobaserade frågor ansågs göra verktyget mer passande för de unga och minimera felen. Verktyget testade en slumpmässig grupp på 250 elever från 12 kommuner där 110 gick i 6:an och 140 i 9:an. Verktyget visade att trots att elever tillbringar större delen av sin tid online med olika enheter och applikationer är de inte tillräckligt säkra, vilket utgör en risk för dem. Dessutom var majoriteten av eleverna intresserade av att få utbildning i cybersäkerhet och väldigt få fick det i skolorna trots att det står i styrdokumenten för teknikämnet.
Wong, Kit-mei. "Investigating the effectiveness of direct instruction of guessing from context for improving English as a second language primary students' word-attack skills." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3567703X.
Повний текст джерелаMilinic, Vasilije. "Investigating Security Issues in Industrial IoT: A Systematic Literature Review." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54980.
Повний текст джерелаGarrity, Maura. "Investigating team collaboration in the fire department of New York using transcripts from September 11, 2001." Thesis, () SITE REGISTRATION REQUIRED FOR DOWNLOADING, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Jun%5FGarrity.pdf.
Повний текст джерелаTitle from title page of source document (p. iii) (viewed on December 6, 2007). Includes Report documentation page (p. ii). Thesis Advisor(s): Susan G. Hutchins, Anthony Kendall. "June 2007." Includes bibliographical references (p. 171-176 ). Also available in print.
Watson, Nichol. "Achieving '5 a day' : an exploratory mixed method investigation of consumers who attain the UK fruit and vegetable recommendation." Thesis, University of Newcastle Upon Tyne, 2012. http://hdl.handle.net/10443/1718.
Повний текст джерелаDutton, Susan. "An investigation into the factors that attract young students to the Open University and support their studies to module completion." Thesis, Open University, 2014. http://oro.open.ac.uk/49076/.
Повний текст джерелаAlli, Tunde. "An investigation of the challenges faced by a religious charitable organisation in efforts to attain self-sustenance in non-religious secular Britain." Thesis, University of Bolton, 2017. http://ubir.bolton.ac.uk/1210/.
Повний текст джерелаNguyen, Huynh Ngoc Bich. "“Anh Nam, the attach file is my report for trip to KL”: An investigation into the emergence of a new variety of English in written Vietnamese business communication." Thesis, Curtin University, 2014. http://hdl.handle.net/20.500.11937/1116.
Повний текст джерелаDa, Silva Talita. "From Attract to Delight: A Qualitative Study Investigating the Relationship Between Inbound Strategies and Business Growth : A B2B Centric Approach." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38522.
Повний текст джерелаGoodman, Brianne. "The strength of Muslim American couples in the face of heightened discrimination from September 11th and the Iraq War : a project based upon an independent investigation /." View online, 2008. http://hdl.handle.net/10090/5950.
Повний текст джерелаTannert, Swantje [Verfasser], Stefan R. [Gutachter] Schweinberger, Klaus [Gutachter] Rothermund, and Dirk [Gutachter] Wentura. "Do emotional faces attract attention?: an investigation of the boundary conditions of selection biases in favor of emotional facial stimuli / Swantje Tannert ; Gutachter: Stefan R. Schweinberger, Klaus Rothermund, Dirk Wentura." Jena : Friedrich-Schiller-Universität Jena, 2020. http://d-nb.info/1222099993/34.
Повний текст джерелаRuegg, Evonne Teresa Nicole. "Investigating the porphyrias through analysis of biochemical pathways." Thesis, University of Canterbury. Biochemistry, 2014. http://hdl.handle.net/10092/10257.
Повний текст джерела