Advanced search options
You searched for subject:(Threat analysis)
.
Showing records 1 – 30 of
94 total matches.
Search Limiters
Dates
Country
▼ Search Limiters
Texas A&M University
1. Smittick, Amber Leola. The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship.
Degree: PhD, Industrial/Organizational Psychology, 2019, Texas A&M University
URL: http://hdl.handle.net/1969.1/188801
Subjects/Keywords: stereotype threat; mediators; meta-analysis
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Smittick, A. L. (2019). The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/188801
Chicago Manual of Style (16th Edition):
Smittick, Amber Leola. “The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship.” 2019. Doctoral Dissertation, Texas A&M University. Accessed January 22, 2021. http://hdl.handle.net/1969.1/188801.
MLA Handbook (7th Edition):
Smittick, Amber Leola. “The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship.” 2019. Web. 22 Jan 2021.
Vancouver:
Smittick AL. The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship. [Internet] [Doctoral dissertation]. Texas A&M University; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1969.1/188801.
Council of Science Editors:
Smittick AL. The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship. [Doctoral Dissertation]. Texas A&M University; 2019. Available from: http://hdl.handle.net/1969.1/188801
University of Adelaide
2. Vandepeer, Charles. Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors.
Degree: 2011, University of Adelaide
URL: http://hdl.handle.net/2440/70732
Subjects/Keywords: intelligence analysis; non-state actor; threat; threat assessment; intent; capability; terrorism
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Vandepeer, C. (2011). Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors. (Thesis). University of Adelaide. Retrieved from http://hdl.handle.net/2440/70732
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vandepeer, Charles. “Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors.” 2011. Thesis, University of Adelaide. Accessed January 22, 2021. http://hdl.handle.net/2440/70732.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vandepeer, Charles. “Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors.” 2011. Web. 22 Jan 2021.
Vancouver:
Vandepeer C. Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors. [Internet] [Thesis]. University of Adelaide; 2011. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/2440/70732.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vandepeer C. Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors. [Thesis]. University of Adelaide; 2011. Available from: http://hdl.handle.net/2440/70732
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
San Jose State University
3. Runiassy, Maryam. Modeling Cloud Computing Threats and Vulnerabilities.
Degree: MS, Computer Engineering, 2016, San Jose State University
URL: https://doi.org/10.31979/etd.wcn8-66xp
;
https://scholarworks.sjsu.edu/etd_theses/4775
Subjects/Keywords: cloud computing; fishbone diagram; machine learning; root-cause analysis; threat; vulnerability
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Runiassy, M. (2016). Modeling Cloud Computing Threats and Vulnerabilities. (Masters Thesis). San Jose State University. Retrieved from https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775
Chicago Manual of Style (16th Edition):
Runiassy, Maryam. “Modeling Cloud Computing Threats and Vulnerabilities.” 2016. Masters Thesis, San Jose State University. Accessed January 22, 2021. https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775.
MLA Handbook (7th Edition):
Runiassy, Maryam. “Modeling Cloud Computing Threats and Vulnerabilities.” 2016. Web. 22 Jan 2021.
Vancouver:
Runiassy M. Modeling Cloud Computing Threats and Vulnerabilities. [Internet] [Masters thesis]. San Jose State University; 2016. [cited 2021 Jan 22]. Available from: https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775.
Council of Science Editors:
Runiassy M. Modeling Cloud Computing Threats and Vulnerabilities. [Masters Thesis]. San Jose State University; 2016. Available from: https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775
Royal Holloway, University of London
4. Carlos, Marcelo. Towards a multidisciplinary framework for the design and analysis of security ceremonies.
Degree: PhD, 2014, Royal Holloway, University of London
URL: https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207
Subjects/Keywords: security ceremonies; security protocols; threat models; ceremony analysis
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Carlos, M. (2014). Towards a multidisciplinary framework for the design and analysis of security ceremonies. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207
Chicago Manual of Style (16th Edition):
Carlos, Marcelo. “Towards a multidisciplinary framework for the design and analysis of security ceremonies.” 2014. Doctoral Dissertation, Royal Holloway, University of London. Accessed January 22, 2021. https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207.
MLA Handbook (7th Edition):
Carlos, Marcelo. “Towards a multidisciplinary framework for the design and analysis of security ceremonies.” 2014. Web. 22 Jan 2021.
Vancouver:
Carlos M. Towards a multidisciplinary framework for the design and analysis of security ceremonies. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2014. [cited 2021 Jan 22]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207.
Council of Science Editors:
Carlos M. Towards a multidisciplinary framework for the design and analysis of security ceremonies. [Doctoral Dissertation]. Royal Holloway, University of London; 2014. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207
Leiden University
5. Elen, Jan Maurits Nicolas. The China Threat in the Wall Street Journal: 2016-2018.
Degree: 2019, Leiden University
URL: http://hdl.handle.net/1887/68756
Subjects/Keywords: China; threat; content analysis; media; US-China relations
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Elen, J. M. N. (2019). The China Threat in the Wall Street Journal: 2016-2018. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/68756
Chicago Manual of Style (16th Edition):
Elen, Jan Maurits Nicolas. “The China Threat in the Wall Street Journal: 2016-2018.” 2019. Masters Thesis, Leiden University. Accessed January 22, 2021. http://hdl.handle.net/1887/68756.
MLA Handbook (7th Edition):
Elen, Jan Maurits Nicolas. “The China Threat in the Wall Street Journal: 2016-2018.” 2019. Web. 22 Jan 2021.
Vancouver:
Elen JMN. The China Threat in the Wall Street Journal: 2016-2018. [Internet] [Masters thesis]. Leiden University; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1887/68756.
Council of Science Editors:
Elen JMN. The China Threat in the Wall Street Journal: 2016-2018. [Masters Thesis]. Leiden University; 2019. Available from: http://hdl.handle.net/1887/68756
University of Vermont
6.
Beach, Addie.
"It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis.
Degree: Department of Romance Languages & Linguistics, 2019, University of Vermont
URL: https://scholarworks.uvm.edu/hcoltheses/298
Subjects/Keywords: Linguistics; Corpus Linguistics; Discourse Analysis; Twitter; Threat Detection; Social Media
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Beach, A. (2019). "It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis. (Thesis). University of Vermont. Retrieved from https://scholarworks.uvm.edu/hcoltheses/298
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Beach, Addie. “"It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis.” 2019. Thesis, University of Vermont. Accessed January 22, 2021. https://scholarworks.uvm.edu/hcoltheses/298.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Beach, Addie. “"It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis.” 2019. Web. 22 Jan 2021.
Vancouver:
Beach A. "It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis. [Internet] [Thesis]. University of Vermont; 2019. [cited 2021 Jan 22]. Available from: https://scholarworks.uvm.edu/hcoltheses/298.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Beach A. "It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis. [Thesis]. University of Vermont; 2019. Available from: https://scholarworks.uvm.edu/hcoltheses/298
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Western Michigan University
7. Panico, Russell T., Jr. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges.
Degree: PhD, Public Affairs and Administration, 2016, Western Michigan University
URL: https://scholarworks.wmich.edu/dissertations/2469
Subjects/Keywords: Campus; safety; threat; assessment; policy; analysis; Community College Leadership; Education Policy
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Panico, Russell T., J. (2016). An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges. (Doctoral Dissertation). Western Michigan University. Retrieved from https://scholarworks.wmich.edu/dissertations/2469
Chicago Manual of Style (16th Edition):
Panico, Russell T., Jr. “An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges.” 2016. Doctoral Dissertation, Western Michigan University. Accessed January 22, 2021. https://scholarworks.wmich.edu/dissertations/2469.
MLA Handbook (7th Edition):
Panico, Russell T., Jr. “An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges.” 2016. Web. 22 Jan 2021.
Vancouver:
Panico, Russell T. J. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges. [Internet] [Doctoral dissertation]. Western Michigan University; 2016. [cited 2021 Jan 22]. Available from: https://scholarworks.wmich.edu/dissertations/2469.
Council of Science Editors:
Panico, Russell T. J. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges. [Doctoral Dissertation]. Western Michigan University; 2016. Available from: https://scholarworks.wmich.edu/dissertations/2469
8. Tuvesson, Otto. Integrating GIS and multicriteria analysis in the search for roadside bombs.
Degree: IT and Land Management, 2011, University of Gävle
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675
Subjects/Keywords: GIS; multicriteria analysis; IED; risk; threat; Surveying; Lantmäteri
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tuvesson, O. (2011). Integrating GIS and multicriteria analysis in the search for roadside bombs. (Thesis). University of Gävle. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tuvesson, Otto. “Integrating GIS and multicriteria analysis in the search for roadside bombs.” 2011. Thesis, University of Gävle. Accessed January 22, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tuvesson, Otto. “Integrating GIS and multicriteria analysis in the search for roadside bombs.” 2011. Web. 22 Jan 2021.
Vancouver:
Tuvesson O. Integrating GIS and multicriteria analysis in the search for roadside bombs. [Internet] [Thesis]. University of Gävle; 2011. [cited 2021 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tuvesson O. Integrating GIS and multicriteria analysis in the search for roadside bombs. [Thesis]. University of Gävle; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Delft University of Technology
9. Falconieri, Federico (author). Approximate Automated Campaign Analysis with Density Based Clustering.
Degree: 2018, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556
Subjects/Keywords: Cyber Threat Intelligence; killchain; campaign analysis; Density-based clustering
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Falconieri, F. (. (2018). Approximate Automated Campaign Analysis with Density Based Clustering. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556
Chicago Manual of Style (16th Edition):
Falconieri, Federico (author). “Approximate Automated Campaign Analysis with Density Based Clustering.” 2018. Masters Thesis, Delft University of Technology. Accessed January 22, 2021. http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556.
MLA Handbook (7th Edition):
Falconieri, Federico (author). “Approximate Automated Campaign Analysis with Density Based Clustering.” 2018. Web. 22 Jan 2021.
Vancouver:
Falconieri F(. Approximate Automated Campaign Analysis with Density Based Clustering. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2021 Jan 22]. Available from: http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556.
Council of Science Editors:
Falconieri F(. Approximate Automated Campaign Analysis with Density Based Clustering. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556
RMIT University
10. Gamachchi, A. Mathematical models for insider threat mitigation.
Degree: 2017, RMIT University
URL: http://researchbank.rmit.edu.au/view/rmit:162338
Subjects/Keywords: Fields of Research; Insider Threat; Insider Threat Detection; Anaomaly Detection; User Behaviour Analysis; Graph Theory; Attributed Graphs; Data Mining
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Gamachchi, A. (2017). Mathematical models for insider threat mitigation. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:162338
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Gamachchi, A. “Mathematical models for insider threat mitigation.” 2017. Thesis, RMIT University. Accessed January 22, 2021. http://researchbank.rmit.edu.au/view/rmit:162338.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Gamachchi, A. “Mathematical models for insider threat mitigation.” 2017. Web. 22 Jan 2021.
Vancouver:
Gamachchi A. Mathematical models for insider threat mitigation. [Internet] [Thesis]. RMIT University; 2017. [cited 2021 Jan 22]. Available from: http://researchbank.rmit.edu.au/view/rmit:162338.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Gamachchi A. Mathematical models for insider threat mitigation. [Thesis]. RMIT University; 2017. Available from: http://researchbank.rmit.edu.au/view/rmit:162338
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of North Texas
11. Morgan, Deanne. Assessing Terrorist Cyber Threats: Engineering a Functional Construct.
Degree: 2014, University of North Texas
URL: https://digital.library.unt.edu/ark:/67531/metadc799463/
Subjects/Keywords: terrorism; intelligence analysis; cyber threat; cyberterrorism; analysis instrument; intelligence; Cyberterrorism – Risk assessment.; Cyberinfrastructure – Security measures.
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Morgan, D. (2014). Assessing Terrorist Cyber Threats: Engineering a Functional Construct. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc799463/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Morgan, Deanne. “Assessing Terrorist Cyber Threats: Engineering a Functional Construct.” 2014. Thesis, University of North Texas. Accessed January 22, 2021. https://digital.library.unt.edu/ark:/67531/metadc799463/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Morgan, Deanne. “Assessing Terrorist Cyber Threats: Engineering a Functional Construct.” 2014. Web. 22 Jan 2021.
Vancouver:
Morgan D. Assessing Terrorist Cyber Threats: Engineering a Functional Construct. [Internet] [Thesis]. University of North Texas; 2014. [cited 2021 Jan 22]. Available from: https://digital.library.unt.edu/ark:/67531/metadc799463/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Morgan D. Assessing Terrorist Cyber Threats: Engineering a Functional Construct. [Thesis]. University of North Texas; 2014. Available from: https://digital.library.unt.edu/ark:/67531/metadc799463/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
12. Soltani Esterabadi, Afshin. Attack Analysis Methodologies .
Degree: Chalmers tekniska högskola / Institutionen för data och informationsteknik, 2019, Chalmers University of Technology
URL: http://hdl.handle.net/20.500.12380/300610
Subjects/Keywords: Automotive; Cybersecurity; Cyberattack; Attack surface; Attack analysis; Risk assessment; Threat analysis; Attack feasibility; Attack potentials.
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Soltani Esterabadi, A. (2019). Attack Analysis Methodologies . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300610
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Thesis, Chalmers University of Technology. Accessed January 22, 2021. http://hdl.handle.net/20.500.12380/300610.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Web. 22 Jan 2021.
Vancouver:
Soltani Esterabadi A. Attack Analysis Methodologies . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/20.500.12380/300610.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Soltani Esterabadi A. Attack Analysis Methodologies . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300610
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
NSYSU
13. Lin, Yi-ling. Strategic Development of Manufacturers âThe Case of Cooling Fan Company.
Degree: Master, Business Management, 2014, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827
Subjects/Keywords: threat of potential competitors; focusing strategy; cooling fan industry; strategy matrix analysis method; electronic components
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lin, Y. (2014). Strategic Development of Manufacturers âThe Case of Cooling Fan Company. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lin, Yi-ling. “Strategic Development of Manufacturers âThe Case of Cooling Fan Company.” 2014. Thesis, NSYSU. Accessed January 22, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lin, Yi-ling. “Strategic Development of Manufacturers âThe Case of Cooling Fan Company.” 2014. Web. 22 Jan 2021.
Vancouver:
Lin Y. Strategic Development of Manufacturers âThe Case of Cooling Fan Company. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 Jan 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lin Y. Strategic Development of Manufacturers âThe Case of Cooling Fan Company. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Universiteit Utrecht
14. Argyropoulos, N. Designing secure software systems: Combining goal-oriented modeling and risk management.
Degree: 2014, Universiteit Utrecht
URL: http://dspace.library.uu.nl:8080/handle/1874/301242
Subjects/Keywords: Security requirements engineering; risk management; socio-technical systems; information security; risk analysis; threat prioritization
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Argyropoulos, N. (2014). Designing secure software systems: Combining goal-oriented modeling and risk management. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/301242
Chicago Manual of Style (16th Edition):
Argyropoulos, N. “Designing secure software systems: Combining goal-oriented modeling and risk management.” 2014. Masters Thesis, Universiteit Utrecht. Accessed January 22, 2021. http://dspace.library.uu.nl:8080/handle/1874/301242.
MLA Handbook (7th Edition):
Argyropoulos, N. “Designing secure software systems: Combining goal-oriented modeling and risk management.” 2014. Web. 22 Jan 2021.
Vancouver:
Argyropoulos N. Designing secure software systems: Combining goal-oriented modeling and risk management. [Internet] [Masters thesis]. Universiteit Utrecht; 2014. [cited 2021 Jan 22]. Available from: http://dspace.library.uu.nl:8080/handle/1874/301242.
Council of Science Editors:
Argyropoulos N. Designing secure software systems: Combining goal-oriented modeling and risk management. [Masters Thesis]. Universiteit Utrecht; 2014. Available from: http://dspace.library.uu.nl:8080/handle/1874/301242
Texas A&M University
15. Setiawan, Yanuar Ady. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.
Degree: MS, Nuclear Engineering, 2018, Texas A&M University
URL: http://hdl.handle.net/1969.1/173597
Subjects/Keywords: Physical Protection System (PPS); Stochastic (Monte Carlo) Approach; Multi-Path Analysis; Adversary Path; Insider Threat
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Setiawan, Y. A. (2018). ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/173597
Chicago Manual of Style (16th Edition):
Setiawan, Yanuar Ady. “ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.” 2018. Masters Thesis, Texas A&M University. Accessed January 22, 2021. http://hdl.handle.net/1969.1/173597.
MLA Handbook (7th Edition):
Setiawan, Yanuar Ady. “ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.” 2018. Web. 22 Jan 2021.
Vancouver:
Setiawan YA. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. [Internet] [Masters thesis]. Texas A&M University; 2018. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1969.1/173597.
Council of Science Editors:
Setiawan YA. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. [Masters Thesis]. Texas A&M University; 2018. Available from: http://hdl.handle.net/1969.1/173597
Brno University of Technology
16. Vrbecký, Tomáš. Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market.
Degree: 2020, Brno University of Technology
URL: http://hdl.handle.net/11012/191041
Subjects/Keywords: Analýza rizik; e-commerce; FMEA; SEO; hrozba; Risk analysis; e-commerce; FMEA; SEO; threat
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Vrbecký, T. (2020). Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/191041
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vrbecký, Tomáš. “Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market.” 2020. Thesis, Brno University of Technology. Accessed January 22, 2021. http://hdl.handle.net/11012/191041.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vrbecký, Tomáš. “Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market.” 2020. Web. 22 Jan 2021.
Vancouver:
Vrbecký T. Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/11012/191041.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vrbecký T. Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/191041
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of South Florida
17. Wolfberg, William. The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe.
Degree: 2012, University of South Florida
URL: https://scholarcommons.usf.edu/etd/4421
Subjects/Keywords: Global Terrorism; Islamic Extremists; National Security; Population Studies; Threat Analysis; Political Science
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Wolfberg, W. (2012). The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/4421
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Wolfberg, William. “The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe.” 2012. Thesis, University of South Florida. Accessed January 22, 2021. https://scholarcommons.usf.edu/etd/4421.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Wolfberg, William. “The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe.” 2012. Web. 22 Jan 2021.
Vancouver:
Wolfberg W. The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe. [Internet] [Thesis]. University of South Florida; 2012. [cited 2021 Jan 22]. Available from: https://scholarcommons.usf.edu/etd/4421.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Wolfberg W. The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe. [Thesis]. University of South Florida; 2012. Available from: https://scholarcommons.usf.edu/etd/4421
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Maryland
18. Van Brakle, Mischelle. The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa.
Degree: Criminology and Criminal Justice, 2012, University of Maryland
URL: http://hdl.handle.net/1903/12794
Subjects/Keywords: Criminology; South African studies; Ethnic Terrorism; Power Threat Hypothesis; South Africa; Time Series Analysis
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Van Brakle, M. (2012). The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa. (Thesis). University of Maryland. Retrieved from http://hdl.handle.net/1903/12794
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Van Brakle, Mischelle. “The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa.” 2012. Thesis, University of Maryland. Accessed January 22, 2021. http://hdl.handle.net/1903/12794.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Van Brakle, Mischelle. “The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa.” 2012. Web. 22 Jan 2021.
Vancouver:
Van Brakle M. The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa. [Internet] [Thesis]. University of Maryland; 2012. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1903/12794.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Van Brakle M. The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa. [Thesis]. University of Maryland; 2012. Available from: http://hdl.handle.net/1903/12794
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Virginia Tech
19.
Lewis, Michael.
Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis.
Degree: MS, Clincal Psychology, 2018, Virginia Tech
URL: http://hdl.handle.net/10919/83837
Subjects/Keywords: Fear Learning; Threat Conditioning; Latent Growth Mixture Modeling; Latent Class Growth Analysis
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lewis, M. (2018). Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83837
Chicago Manual of Style (16th Edition):
Lewis, Michael. “Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis.” 2018. Masters Thesis, Virginia Tech. Accessed January 22, 2021. http://hdl.handle.net/10919/83837.
MLA Handbook (7th Edition):
Lewis, Michael. “Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis.” 2018. Web. 22 Jan 2021.
Vancouver:
Lewis M. Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/10919/83837.
Council of Science Editors:
Lewis M. Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83837
20. Hill, Kara Norman. Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense.
Degree: PhD, Engineering Management, 2012, Old Dominion University
URL: 9781267395924
;
https://digitalcommons.odu.edu/emse_etds/74
Subjects/Keywords: Homeland security; Risk perception; Threat assessment; Vulnerability; Defense and Security Studies; Operational Research; Risk Analysis
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Hill, K. N. (2012). Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense. (Doctoral Dissertation). Old Dominion University. Retrieved from 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74
Chicago Manual of Style (16th Edition):
Hill, Kara Norman. “Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense.” 2012. Doctoral Dissertation, Old Dominion University. Accessed January 22, 2021. 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74.
MLA Handbook (7th Edition):
Hill, Kara Norman. “Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense.” 2012. Web. 22 Jan 2021.
Vancouver:
Hill KN. Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense. [Internet] [Doctoral dissertation]. Old Dominion University; 2012. [cited 2021 Jan 22]. Available from: 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74.
Council of Science Editors:
Hill KN. Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense. [Doctoral Dissertation]. Old Dominion University; 2012. Available from: 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74
Linköping University
21. Vestlund, Christian. Threat Analysis on Vehicle Computer Systems.
Degree: Computer and Information Science, 2010, Linköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661
Subjects/Keywords: Vehicle computer system; threat; threat analysis; fault tree; Computer Sciences; Datavetenskap (datalogi)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Vestlund, C. (2010). Threat Analysis on Vehicle Computer Systems. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vestlund, Christian. “Threat Analysis on Vehicle Computer Systems.” 2010. Thesis, Linköping University. Accessed January 22, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vestlund, Christian. “Threat Analysis on Vehicle Computer Systems.” 2010. Web. 22 Jan 2021.
Vancouver:
Vestlund C. Threat Analysis on Vehicle Computer Systems. [Internet] [Thesis]. Linköping University; 2010. [cited 2021 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vestlund C. Threat Analysis on Vehicle Computer Systems. [Thesis]. Linköping University; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Leiden University
22. Van Alphen, H.F. Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis.
Degree: 2015, Leiden University
URL: http://hdl.handle.net/1887/34481
Subjects/Keywords: maritime silk road; discourse analysis; India; China; string of pearls; identity; threat perceptions; media representations; indian ocean region
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Van Alphen, H. F. (2015). Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/34481
Chicago Manual of Style (16th Edition):
Van Alphen, H F. “Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis.” 2015. Masters Thesis, Leiden University. Accessed January 22, 2021. http://hdl.handle.net/1887/34481.
MLA Handbook (7th Edition):
Van Alphen, H F. “Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis.” 2015. Web. 22 Jan 2021.
Vancouver:
Van Alphen HF. Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis. [Internet] [Masters thesis]. Leiden University; 2015. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1887/34481.
Council of Science Editors:
Van Alphen HF. Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis. [Masters Thesis]. Leiden University; 2015. Available from: http://hdl.handle.net/1887/34481
Leiden University
23. Lennep, Tove van. The UNHCR in the UK: Guardian of Refugee Protection?.
Degree: 2018, Leiden University
URL: http://hdl.handle.net/1887/65067
Subjects/Keywords: UNHCR; anti-refugee sentiment; United Kingdom; Integrated Threat Theory; anti-refugee discourse; discourse analysis; UNHCR campaigns; refugee protection norms; stereotypes; postcolonialism
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lennep, T. v. (2018). The UNHCR in the UK: Guardian of Refugee Protection?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/65067
Chicago Manual of Style (16th Edition):
Lennep, Tove van. “The UNHCR in the UK: Guardian of Refugee Protection?.” 2018. Masters Thesis, Leiden University. Accessed January 22, 2021. http://hdl.handle.net/1887/65067.
MLA Handbook (7th Edition):
Lennep, Tove van. “The UNHCR in the UK: Guardian of Refugee Protection?.” 2018. Web. 22 Jan 2021.
Vancouver:
Lennep Tv. The UNHCR in the UK: Guardian of Refugee Protection?. [Internet] [Masters thesis]. Leiden University; 2018. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1887/65067.
Council of Science Editors:
Lennep Tv. The UNHCR in the UK: Guardian of Refugee Protection?. [Masters Thesis]. Leiden University; 2018. Available from: http://hdl.handle.net/1887/65067
Brno University of Technology
24. Jacko, Jerguš. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.
Degree: 2020, Brno University of Technology
URL: http://hdl.handle.net/11012/189758
Subjects/Keywords: STIX; TAXII; CybOX; IDEA; spracovanie bezpečnostných hrozieb; výmena bezpečnostných hrozieb; STIX; TAXII; CybOX; IDEA; cyber thrat analysis; cyber threat exchange
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jacko, J. (2020). Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/189758
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2020. Thesis, Brno University of Technology. Accessed January 22, 2021. http://hdl.handle.net/11012/189758.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2020. Web. 22 Jan 2021.
Vancouver:
Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/11012/189758.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/189758
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Vermont
25. McCleary-Gaddy, Asia. A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern.
Degree: PhD, Psychology, 2018, University of Vermont
URL: https://scholarworks.uvm.edu/graddis/862
Subjects/Keywords: Affirmative Action; Empathy; Identity threat; Intergroup interactions; Merit; White Privilege; Experimental Analysis of Behavior; Social Psychology
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
McCleary-Gaddy, A. (2018). A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern. (Doctoral Dissertation). University of Vermont. Retrieved from https://scholarworks.uvm.edu/graddis/862
Chicago Manual of Style (16th Edition):
McCleary-Gaddy, Asia. “A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern.” 2018. Doctoral Dissertation, University of Vermont. Accessed January 22, 2021. https://scholarworks.uvm.edu/graddis/862.
MLA Handbook (7th Edition):
McCleary-Gaddy, Asia. “A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern.” 2018. Web. 22 Jan 2021.
Vancouver:
McCleary-Gaddy A. A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern. [Internet] [Doctoral dissertation]. University of Vermont; 2018. [cited 2021 Jan 22]. Available from: https://scholarworks.uvm.edu/graddis/862.
Council of Science Editors:
McCleary-Gaddy A. A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern. [Doctoral Dissertation]. University of Vermont; 2018. Available from: https://scholarworks.uvm.edu/graddis/862
University of Bradford
26. Munir, Rashid. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.
Degree: PhD, 2014, University of Bradford
URL: http://hdl.handle.net/10454/14251
Subjects/Keywords: 005.8; Enterprise network security; Vulnerability analysis; Security assessment; Risk; Threat detection; Common Vulnerability Scoring System (CVSS)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Munir, R. (2014). A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/14251
Chicago Manual of Style (16th Edition):
Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Doctoral Dissertation, University of Bradford. Accessed January 22, 2021. http://hdl.handle.net/10454/14251.
MLA Handbook (7th Edition):
Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Web. 22 Jan 2021.
Vancouver:
Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Internet] [Doctoral dissertation]. University of Bradford; 2014. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/10454/14251.
Council of Science Editors:
Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Doctoral Dissertation]. University of Bradford; 2014. Available from: http://hdl.handle.net/10454/14251
Wilfrid Laurier University
27. Wang, Wan. Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement.
Degree: 2018, Wilfrid Laurier University
URL: https://scholars.wlu.ca/etd/2004
Subjects/Keywords: narcissism; verbal aggression; hostility; self-threat; self-affirmation; flaming; Experimental Analysis of Behavior; Personality and Social Contexts; Quantitative Psychology; Social Psychology
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Wang, W. (2018). Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement. (Thesis). Wilfrid Laurier University. Retrieved from https://scholars.wlu.ca/etd/2004
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Wang, Wan. “Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement.” 2018. Thesis, Wilfrid Laurier University. Accessed January 22, 2021. https://scholars.wlu.ca/etd/2004.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Wang, Wan. “Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement.” 2018. Web. 22 Jan 2021.
Vancouver:
Wang W. Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement. [Internet] [Thesis]. Wilfrid Laurier University; 2018. [cited 2021 Jan 22]. Available from: https://scholars.wlu.ca/etd/2004.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Wang W. Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement. [Thesis]. Wilfrid Laurier University; 2018. Available from: https://scholars.wlu.ca/etd/2004
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
28. Gong, Xuwei. Security Threats and Countermeasures for Connected Vehicles.
Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494
Subjects/Keywords: Connected vehicle; Use case; Threat analysis; Countermeasures; anslutna fordon; användningsfall; hotanalys; motåtgärd; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Gong, X. (2019). Security Threats and Countermeasures for Connected Vehicles. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Gong, Xuwei. “Security Threats and Countermeasures for Connected Vehicles.” 2019. Thesis, KTH. Accessed January 22, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Gong, Xuwei. “Security Threats and Countermeasures for Connected Vehicles.” 2019. Web. 22 Jan 2021.
Vancouver:
Gong X. Security Threats and Countermeasures for Connected Vehicles. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Gong X. Security Threats and Countermeasures for Connected Vehicles. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Rice University
29. Piersall, Paul. Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers.
Degree: DMA, Music, 2012, Rice University
URL: http://hdl.handle.net/1911/64636
Subjects/Keywords: Feminine style; Heinrich Heine; Grundgestalt analysis; Ich Stand in Dunkeln Traumen; Stereotype threat; Compositional choice in song; Vocal performance
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Piersall, P. (2012). Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers. (Doctoral Dissertation). Rice University. Retrieved from http://hdl.handle.net/1911/64636
Chicago Manual of Style (16th Edition):
Piersall, Paul. “Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers.” 2012. Doctoral Dissertation, Rice University. Accessed January 22, 2021. http://hdl.handle.net/1911/64636.
MLA Handbook (7th Edition):
Piersall, Paul. “Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers.” 2012. Web. 22 Jan 2021.
Vancouver:
Piersall P. Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers. [Internet] [Doctoral dissertation]. Rice University; 2012. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1911/64636.
Council of Science Editors:
Piersall P. Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers. [Doctoral Dissertation]. Rice University; 2012. Available from: http://hdl.handle.net/1911/64636
Brno University of Technology
30. Jacko, Jerguš. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.
Degree: 2019, Brno University of Technology
URL: http://hdl.handle.net/11012/61987
Subjects/Keywords: STIX; TAXII; CybOX; IDEA; spracovanie bezpečnostných hrozieb; výmena bezpečnostných hrozieb; STIX; TAXII; CybOX; IDEA; cyber thrat analysis; cyber threat exchange
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jacko, J. (2019). Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61987
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2019. Thesis, Brno University of Technology. Accessed January 22, 2021. http://hdl.handle.net/11012/61987.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2019. Web. 22 Jan 2021.
Vancouver:
Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/11012/61987.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/61987
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation