Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Threat Modelling). Showing records 1 – 9 of 9 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of St. Andrews

1. Greenwood, David. Socio-technical analysis of system-of-systems using responsibility modelling .

Degree: 2012, University of St. Andrews

 Society is challenging systems engineers by demanding increasingly complex and integrated IT systems (Northrop et al., 2006; RAE, 2004) e.g. integrated enterprise resource planning systems,… (more)

Subjects/Keywords: System-of-systems; Socio-technical systems; Responsibility modelling; Troubleshooting; Threat identification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Greenwood, D. (2012). Socio-technical analysis of system-of-systems using responsibility modelling . (Thesis). University of St. Andrews. Retrieved from http://hdl.handle.net/10023/3176

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Greenwood, David. “Socio-technical analysis of system-of-systems using responsibility modelling .” 2012. Thesis, University of St. Andrews. Accessed June 06, 2020. http://hdl.handle.net/10023/3176.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Greenwood, David. “Socio-technical analysis of system-of-systems using responsibility modelling .” 2012. Web. 06 Jun 2020.

Vancouver:

Greenwood D. Socio-technical analysis of system-of-systems using responsibility modelling . [Internet] [Thesis]. University of St. Andrews; 2012. [cited 2020 Jun 06]. Available from: http://hdl.handle.net/10023/3176.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Greenwood D. Socio-technical analysis of system-of-systems using responsibility modelling . [Thesis]. University of St. Andrews; 2012. Available from: http://hdl.handle.net/10023/3176

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Edinburgh

2. Gkaniatsou, Andriana Evgenia. Analysis of low-level implementations of cryptographic protocols.

Degree: PhD, 2018, University of Edinburgh

 This thesis examines the vulnerabilities due to low-level implementation deficiencies of otherwise secure communication protocols in smart-cards. Smart-cards are considered to be one of the… (more)

Subjects/Keywords: smart-card; pkcs#11; bitcoin; security; formal reverse-engineering; threat-modelling; attacks; APDU

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gkaniatsou, A. E. (2018). Analysis of low-level implementations of cryptographic protocols. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/29613

Chicago Manual of Style (16th Edition):

Gkaniatsou, Andriana Evgenia. “Analysis of low-level implementations of cryptographic protocols.” 2018. Doctoral Dissertation, University of Edinburgh. Accessed June 06, 2020. http://hdl.handle.net/1842/29613.

MLA Handbook (7th Edition):

Gkaniatsou, Andriana Evgenia. “Analysis of low-level implementations of cryptographic protocols.” 2018. Web. 06 Jun 2020.

Vancouver:

Gkaniatsou AE. Analysis of low-level implementations of cryptographic protocols. [Internet] [Doctoral dissertation]. University of Edinburgh; 2018. [cited 2020 Jun 06]. Available from: http://hdl.handle.net/1842/29613.

Council of Science Editors:

Gkaniatsou AE. Analysis of low-level implementations of cryptographic protocols. [Doctoral Dissertation]. University of Edinburgh; 2018. Available from: http://hdl.handle.net/1842/29613


KTH

3. Svensson, Carl. Threat modelling of historical attacks with CySeMoL.

Degree: Computer Science and Communication (CSC), 2015, KTH

This report investigates the modelling power of the Cyber Security Modelling Language, CySeMoL by looking at three documented cyber attacks and attempting to model… (more)

Subjects/Keywords: threat modelling; CySeMoL; it attacks; hotmodellering; CySeMoL; it-angrepp; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Svensson, C. (2015). Threat modelling of historical attacks with CySeMoL. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Svensson, Carl. “Threat modelling of historical attacks with CySeMoL.” 2015. Thesis, KTH. Accessed June 06, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Svensson, Carl. “Threat modelling of historical attacks with CySeMoL.” 2015. Web. 06 Jun 2020.

Vancouver:

Svensson C. Threat modelling of historical attacks with CySeMoL. [Internet] [Thesis]. KTH; 2015. [cited 2020 Jun 06]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Svensson C. Threat modelling of historical attacks with CySeMoL. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

4. Mahopo, Ntombizodwa Bessy. A risk based approach for managing information technology security risk within a dynamic environment.

Degree: 2015, University of South Africa

 Information technology (IT) security, which is concerned with protecting the confidentiality, integrity and availability of information technology assets, inherently possesses a significant amount of known… (more)

Subjects/Keywords: IT; IT security; Risk; Risk management; IT security threat modelling; IT security management; OCTAVE; COBIT; ITIL; ISO 27001/2; ISF Standard of Good Practice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahopo, N. B. (2015). A risk based approach for managing information technology security risk within a dynamic environment. (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/21925

Chicago Manual of Style (16th Edition):

Mahopo, Ntombizodwa Bessy. “A risk based approach for managing information technology security risk within a dynamic environment.” 2015. Masters Thesis, University of South Africa. Accessed June 06, 2020. http://hdl.handle.net/10500/21925.

MLA Handbook (7th Edition):

Mahopo, Ntombizodwa Bessy. “A risk based approach for managing information technology security risk within a dynamic environment.” 2015. Web. 06 Jun 2020.

Vancouver:

Mahopo NB. A risk based approach for managing information technology security risk within a dynamic environment. [Internet] [Masters thesis]. University of South Africa; 2015. [cited 2020 Jun 06]. Available from: http://hdl.handle.net/10500/21925.

Council of Science Editors:

Mahopo NB. A risk based approach for managing information technology security risk within a dynamic environment. [Masters Thesis]. University of South Africa; 2015. Available from: http://hdl.handle.net/10500/21925

5. Ioannou, Christina. Facing social threats in adolescents with autism spectrum disorders : Percevoir et agir face à la menace sociale : études chez des adolescents atteints de troubles du spectre de l'autisme.

Degree: Docteur es, Sciences cognitives, 2017, Paris Sciences et Lettres

Les troubles du spectre de l’autisme (TSA) sont caractérisés par des difficultés persistantes dans les domaines de la communication et des interactions sociales. Les individus… (more)

Subjects/Keywords: Autisme; Menace sociale; Prise de décisions; Tendances d'action; Adolescents; Modèles computationnelles; Autism; Social threat; Decision making; Action tendencies; Adolescents; Computational modelling; 153

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ioannou, C. (2017). Facing social threats in adolescents with autism spectrum disorders : Percevoir et agir face à la menace sociale : études chez des adolescents atteints de troubles du spectre de l'autisme. (Doctoral Dissertation). Paris Sciences et Lettres. Retrieved from http://www.theses.fr/2017PSLEE073

Chicago Manual of Style (16th Edition):

Ioannou, Christina. “Facing social threats in adolescents with autism spectrum disorders : Percevoir et agir face à la menace sociale : études chez des adolescents atteints de troubles du spectre de l'autisme.” 2017. Doctoral Dissertation, Paris Sciences et Lettres. Accessed June 06, 2020. http://www.theses.fr/2017PSLEE073.

MLA Handbook (7th Edition):

Ioannou, Christina. “Facing social threats in adolescents with autism spectrum disorders : Percevoir et agir face à la menace sociale : études chez des adolescents atteints de troubles du spectre de l'autisme.” 2017. Web. 06 Jun 2020.

Vancouver:

Ioannou C. Facing social threats in adolescents with autism spectrum disorders : Percevoir et agir face à la menace sociale : études chez des adolescents atteints de troubles du spectre de l'autisme. [Internet] [Doctoral dissertation]. Paris Sciences et Lettres; 2017. [cited 2020 Jun 06]. Available from: http://www.theses.fr/2017PSLEE073.

Council of Science Editors:

Ioannou C. Facing social threats in adolescents with autism spectrum disorders : Percevoir et agir face à la menace sociale : études chez des adolescents atteints de troubles du spectre de l'autisme. [Doctoral Dissertation]. Paris Sciences et Lettres; 2017. Available from: http://www.theses.fr/2017PSLEE073


KTH

6. Virdi, Amandeep Singh. AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

Attack simulations provide a viable means to test the cyber security of a system. The simulations trace the steps taken by the attacker to… (more)

Subjects/Keywords: Domain Specific Language; Cyber Security; Threat Modelling; Attack Graphs; Amazon Web Services; Domänspecifikt Språk; Cybersäkerhet; Hotmodellering; Attackgrafer; Amazon Web Services; Computer and Information Sciences; Data- och informationsvetenskap; Electrical Engineering, Electronic Engineering, Information Engineering; Elektroteknik och elektronik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Virdi, A. S. (2018). AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Virdi, Amandeep Singh. “AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment.” 2018. Thesis, KTH. Accessed June 06, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Virdi, Amandeep Singh. “AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment.” 2018. Web. 06 Jun 2020.

Vancouver:

Virdi AS. AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment. [Internet] [Thesis]. KTH; 2018. [cited 2020 Jun 06]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Virdi AS. AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Booth, Louis Cameron. IoT Penetration Testing: Hacking an Electric Scooter.

Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH

The industry of the Internet of Things (IoT) is a burgeoning market. A wide variety of devices now come equipped with the ability to… (more)

Subjects/Keywords: Internet of Things; penetration testing; threat modelling; ethical hacking; Internet of Things; penetrationstestning; hotmodellering; etisk hackning; Computer and Information Sciences; Data- och informationsvetenskap

…that of connected vehicles. Keeping in mind the aforementioned benefits of threat modelling… …exploit the bug. 9 4 Threat model In our threat modelling of the Xiaomi M365 we aimed to… …similar work in the field, developed a threat model and then carried out our own testing process… …understand what the process of threat modeling entails and the benefits it can provide we refer to… …the work of Wenjun Xiong and Robert Lagerström. In their article titled Threat Modeling: a… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Booth, L. C. (2019). IoT Penetration Testing: Hacking an Electric Scooter. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254613

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Booth, Louis Cameron. “IoT Penetration Testing: Hacking an Electric Scooter.” 2019. Thesis, KTH. Accessed June 06, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254613.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Booth, Louis Cameron. “IoT Penetration Testing: Hacking an Electric Scooter.” 2019. Web. 06 Jun 2020.

Vancouver:

Booth LC. IoT Penetration Testing: Hacking an Electric Scooter. [Internet] [Thesis]. KTH; 2019. [cited 2020 Jun 06]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254613.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Booth LC. IoT Penetration Testing: Hacking an Electric Scooter. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254613

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Runge, Claire. Conserving migratory and nomadic species.

Degree: School of Biological Sciences, 2015, University of Queensland

Subjects/Keywords: Conservation planning; Migration; Migratory connectivity; Nomadic; Movement; Species distribution modelling; Threat listing; Spatial prioritization; Extinction risk; Environmental policy; 0502 Environmental Science and Management; 0602 Ecology

…connectivity, nomadic, movement, species distribution modelling, threat listing, spatial… …Photosynthetic vegetation SDM Species distribution modelling Definition of common terms Arid: The… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Runge, C. (2015). Conserving migratory and nomadic species. (Thesis). University of Queensland. Retrieved from http://espace.library.uq.edu.au/view/UQ:356409

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Runge, Claire. “Conserving migratory and nomadic species.” 2015. Thesis, University of Queensland. Accessed June 06, 2020. http://espace.library.uq.edu.au/view/UQ:356409.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Runge, Claire. “Conserving migratory and nomadic species.” 2015. Web. 06 Jun 2020.

Vancouver:

Runge C. Conserving migratory and nomadic species. [Internet] [Thesis]. University of Queensland; 2015. [cited 2020 Jun 06]. Available from: http://espace.library.uq.edu.au/view/UQ:356409.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Runge C. Conserving migratory and nomadic species. [Thesis]. University of Queensland; 2015. Available from: http://espace.library.uq.edu.au/view/UQ:356409

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Queensland

9. Tulloch, Vivitskaia. Managing direct and indirect threats to marine ecosystems to balance multiple objectives.

Degree: School of Biological Sciences, 2017, University of Queensland

Subjects/Keywords: Conservation planning; Decision-making; Threat management; Ecosystem modelling; Multispecies models; Integrated land-sea planning; Interactions; Stressors; Uncertainty; Climate change; 010202 Biological Mathematics; 050101 Ecological Impacts of Climate Change; 050202 Conservation and Biodiversity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tulloch, V. (2017). Managing direct and indirect threats to marine ecosystems to balance multiple objectives. (Thesis). University of Queensland. Retrieved from http://espace.library.uq.edu.au/view/UQ:688979

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tulloch, Vivitskaia. “Managing direct and indirect threats to marine ecosystems to balance multiple objectives.” 2017. Thesis, University of Queensland. Accessed June 06, 2020. http://espace.library.uq.edu.au/view/UQ:688979.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tulloch, Vivitskaia. “Managing direct and indirect threats to marine ecosystems to balance multiple objectives.” 2017. Web. 06 Jun 2020.

Vancouver:

Tulloch V. Managing direct and indirect threats to marine ecosystems to balance multiple objectives. [Internet] [Thesis]. University of Queensland; 2017. [cited 2020 Jun 06]. Available from: http://espace.library.uq.edu.au/view/UQ:688979.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tulloch V. Managing direct and indirect threats to marine ecosystems to balance multiple objectives. [Thesis]. University of Queensland; 2017. Available from: http://espace.library.uq.edu.au/view/UQ:688979

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.