Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Threat analysis). Showing records 1 – 30 of 94 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Levels

Languages

Country

▼ Search Limiters


Texas A&M University

1. Smittick, Amber Leola. The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship.

Degree: PhD, Industrial/Organizational Psychology, 2019, Texas A&M University

 Stereotype threat is an important phenomenon in educational and organizational settings as it results in lower test scores for minority and women test takers on… (more)

Subjects/Keywords: stereotype threat; mediators; meta-analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smittick, A. L. (2019). The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/188801

Chicago Manual of Style (16th Edition):

Smittick, Amber Leola. “The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship.” 2019. Doctoral Dissertation, Texas A&M University. Accessed January 22, 2021. http://hdl.handle.net/1969.1/188801.

MLA Handbook (7th Edition):

Smittick, Amber Leola. “The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship.” 2019. Web. 22 Jan 2021.

Vancouver:

Smittick AL. The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship. [Internet] [Doctoral dissertation]. Texas A&M University; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1969.1/188801.

Council of Science Editors:

Smittick AL. The In-Between: A Meta-Analytic Investigation of Stereotype Threat Effects on Mediators of the Stereotype Threat-Performance Relationship. [Doctoral Dissertation]. Texas A&M University; 2019. Available from: http://hdl.handle.net/1969.1/188801


University of Adelaide

2. Vandepeer, Charles. Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors.

Degree: 2011, University of Adelaide

 Recommendations for critical examinations of existing analytical approaches have become a consistent feature of the intelligence literature. Many of these are based on the recognition… (more)

Subjects/Keywords: intelligence analysis; non-state actor; threat; threat assessment; intent; capability; terrorism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vandepeer, C. (2011). Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors. (Thesis). University of Adelaide. Retrieved from http://hdl.handle.net/2440/70732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vandepeer, Charles. “Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors.” 2011. Thesis, University of Adelaide. Accessed January 22, 2021. http://hdl.handle.net/2440/70732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vandepeer, Charles. “Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors.” 2011. Web. 22 Jan 2021.

Vancouver:

Vandepeer C. Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors. [Internet] [Thesis]. University of Adelaide; 2011. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/2440/70732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vandepeer C. Rethinking threat: intelligence analysis, intentions, capabilities, and the challenge of non-state actors. [Thesis]. University of Adelaide; 2011. Available from: http://hdl.handle.net/2440/70732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


San Jose State University

3. Runiassy, Maryam. Modeling Cloud Computing Threats and Vulnerabilities.

Degree: MS, Computer Engineering, 2016, San Jose State University

  Cloud-computing is a new paradigm with great potentials for delivering a wide variety of services to different types of customers. It can substitute the… (more)

Subjects/Keywords: cloud computing; fishbone diagram; machine learning; root-cause analysis; threat; vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Runiassy, M. (2016). Modeling Cloud Computing Threats and Vulnerabilities. (Masters Thesis). San Jose State University. Retrieved from https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775

Chicago Manual of Style (16th Edition):

Runiassy, Maryam. “Modeling Cloud Computing Threats and Vulnerabilities.” 2016. Masters Thesis, San Jose State University. Accessed January 22, 2021. https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775.

MLA Handbook (7th Edition):

Runiassy, Maryam. “Modeling Cloud Computing Threats and Vulnerabilities.” 2016. Web. 22 Jan 2021.

Vancouver:

Runiassy M. Modeling Cloud Computing Threats and Vulnerabilities. [Internet] [Masters thesis]. San Jose State University; 2016. [cited 2021 Jan 22]. Available from: https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775.

Council of Science Editors:

Runiassy M. Modeling Cloud Computing Threats and Vulnerabilities. [Masters Thesis]. San Jose State University; 2016. Available from: https://doi.org/10.31979/etd.wcn8-66xp ; https://scholarworks.sjsu.edu/etd_theses/4775


Royal Holloway, University of London

4. Carlos, Marcelo. Towards a multidisciplinary framework for the design and analysis of security ceremonies.

Degree: PhD, 2014, Royal Holloway, University of London

 In today's networked society, security protocols are widely used by the majority of people. From web browsing and instant messaging to cash machines, we are… (more)

Subjects/Keywords: security ceremonies; security protocols; threat models; ceremony analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carlos, M. (2014). Towards a multidisciplinary framework for the design and analysis of security ceremonies. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207

Chicago Manual of Style (16th Edition):

Carlos, Marcelo. “Towards a multidisciplinary framework for the design and analysis of security ceremonies.” 2014. Doctoral Dissertation, Royal Holloway, University of London. Accessed January 22, 2021. https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207.

MLA Handbook (7th Edition):

Carlos, Marcelo. “Towards a multidisciplinary framework for the design and analysis of security ceremonies.” 2014. Web. 22 Jan 2021.

Vancouver:

Carlos M. Towards a multidisciplinary framework for the design and analysis of security ceremonies. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2014. [cited 2021 Jan 22]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207.

Council of Science Editors:

Carlos M. Towards a multidisciplinary framework for the design and analysis of security ceremonies. [Doctoral Dissertation]. Royal Holloway, University of London; 2014. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/towards-a-multidisciplinary-framework-for-the-design-and-analysis-of-security-ceremonies(d26360d4-8baf-438e-8fc1-09f6a652b2c9).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792207


Leiden University

5. Elen, Jan Maurits Nicolas. The China Threat in the Wall Street Journal: 2016-2018.

Degree: 2019, Leiden University

 Bilateral relations between the United States and China have increasingly soured since President Donald Trump assumed office in 2017. A key reason is that China’s… (more)

Subjects/Keywords: China; threat; content analysis; media; US-China relations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elen, J. M. N. (2019). The China Threat in the Wall Street Journal: 2016-2018. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/68756

Chicago Manual of Style (16th Edition):

Elen, Jan Maurits Nicolas. “The China Threat in the Wall Street Journal: 2016-2018.” 2019. Masters Thesis, Leiden University. Accessed January 22, 2021. http://hdl.handle.net/1887/68756.

MLA Handbook (7th Edition):

Elen, Jan Maurits Nicolas. “The China Threat in the Wall Street Journal: 2016-2018.” 2019. Web. 22 Jan 2021.

Vancouver:

Elen JMN. The China Threat in the Wall Street Journal: 2016-2018. [Internet] [Masters thesis]. Leiden University; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1887/68756.

Council of Science Editors:

Elen JMN. The China Threat in the Wall Street Journal: 2016-2018. [Masters Thesis]. Leiden University; 2019. Available from: http://hdl.handle.net/1887/68756


University of Vermont

6. Beach, Addie. "It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis.

Degree: Department of Romance Languages & Linguistics, 2019, University of Vermont

  As social media increases in popularity, its ability to create culturally meaningful tools grows as well. One of the most promising tools is categorization… (more)

Subjects/Keywords: Linguistics; Corpus Linguistics; Discourse Analysis; Twitter; Threat Detection; Social Media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beach, A. (2019). "It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis. (Thesis). University of Vermont. Retrieved from https://scholarworks.uvm.edu/hcoltheses/298

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Beach, Addie. “"It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis.” 2019. Thesis, University of Vermont. Accessed January 22, 2021. https://scholarworks.uvm.edu/hcoltheses/298.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Beach, Addie. “"It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis.” 2019. Web. 22 Jan 2021.

Vancouver:

Beach A. "It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis. [Internet] [Thesis]. University of Vermont; 2019. [cited 2021 Jan 22]. Available from: https://scholarworks.uvm.edu/hcoltheses/298.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Beach A. "It's So Bomb": Exploring Corpus-Based Threat Detection on Twitter with Discourse Analysis. [Thesis]. University of Vermont; 2019. Available from: https://scholarworks.uvm.edu/hcoltheses/298

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Western Michigan University

7. Panico, Russell T., Jr. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges.

Degree: PhD, Public Affairs and Administration, 2016, Western Michigan University

  This dissertation evaluated campus violence threat assessment policy and procedure implementation at the community college level of higher education. The importance of this topic… (more)

Subjects/Keywords: Campus; safety; threat; assessment; policy; analysis; Community College Leadership; Education Policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Panico, Russell T., J. (2016). An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges. (Doctoral Dissertation). Western Michigan University. Retrieved from https://scholarworks.wmich.edu/dissertations/2469

Chicago Manual of Style (16th Edition):

Panico, Russell T., Jr. “An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges.” 2016. Doctoral Dissertation, Western Michigan University. Accessed January 22, 2021. https://scholarworks.wmich.edu/dissertations/2469.

MLA Handbook (7th Edition):

Panico, Russell T., Jr. “An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges.” 2016. Web. 22 Jan 2021.

Vancouver:

Panico, Russell T. J. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges. [Internet] [Doctoral dissertation]. Western Michigan University; 2016. [cited 2021 Jan 22]. Available from: https://scholarworks.wmich.edu/dissertations/2469.

Council of Science Editors:

Panico, Russell T. J. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges. [Doctoral Dissertation]. Western Michigan University; 2016. Available from: https://scholarworks.wmich.edu/dissertations/2469

8. Tuvesson, Otto. Integrating GIS and multicriteria analysis in the search for roadside bombs.

Degree: IT and Land Management, 2011, University of Gävle

  The idea of this study is to test if it is possible to use a modified Multi Critera Analysis (MCA) to automatically identify probable… (more)

Subjects/Keywords: GIS; multicriteria analysis; IED; risk; threat; Surveying; Lantmäteri

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tuvesson, O. (2011). Integrating GIS and multicriteria analysis in the search for roadside bombs. (Thesis). University of Gävle. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tuvesson, Otto. “Integrating GIS and multicriteria analysis in the search for roadside bombs.” 2011. Thesis, University of Gävle. Accessed January 22, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tuvesson, Otto. “Integrating GIS and multicriteria analysis in the search for roadside bombs.” 2011. Web. 22 Jan 2021.

Vancouver:

Tuvesson O. Integrating GIS and multicriteria analysis in the search for roadside bombs. [Internet] [Thesis]. University of Gävle; 2011. [cited 2021 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tuvesson O. Integrating GIS and multicriteria analysis in the search for roadside bombs. [Thesis]. University of Gävle; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9675

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

9. Falconieri, Federico (author). Approximate Automated Campaign Analysis with Density Based Clustering.

Degree: 2018, Delft University of Technology

The modern cybersecurity landscape is characterised by the increasing number of actors capable of performing advanced and highly impactful hacking. The situation has worsened significantly… (more)

Subjects/Keywords: Cyber Threat Intelligence; killchain; campaign analysis; Density-based clustering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Falconieri, F. (. (2018). Approximate Automated Campaign Analysis with Density Based Clustering. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556

Chicago Manual of Style (16th Edition):

Falconieri, Federico (author). “Approximate Automated Campaign Analysis with Density Based Clustering.” 2018. Masters Thesis, Delft University of Technology. Accessed January 22, 2021. http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556.

MLA Handbook (7th Edition):

Falconieri, Federico (author). “Approximate Automated Campaign Analysis with Density Based Clustering.” 2018. Web. 22 Jan 2021.

Vancouver:

Falconieri F(. Approximate Automated Campaign Analysis with Density Based Clustering. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2021 Jan 22]. Available from: http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556.

Council of Science Editors:

Falconieri F(. Approximate Automated Campaign Analysis with Density Based Clustering. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:415e3a76-48b5-4b43-8dc3-96a83056c556


RMIT University

10. Gamachchi, A. Mathematical models for insider threat mitigation.

Degree: 2017, RMIT University

 The world is rapidly undergoing a massive digital transformation where every human will have no choice but to rely on the confidentiality, integrity, and availability… (more)

Subjects/Keywords: Fields of Research; Insider Threat; Insider Threat Detection; Anaomaly Detection; User Behaviour Analysis; Graph Theory; Attributed Graphs; Data Mining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gamachchi, A. (2017). Mathematical models for insider threat mitigation. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:162338

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gamachchi, A. “Mathematical models for insider threat mitigation.” 2017. Thesis, RMIT University. Accessed January 22, 2021. http://researchbank.rmit.edu.au/view/rmit:162338.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gamachchi, A. “Mathematical models for insider threat mitigation.” 2017. Web. 22 Jan 2021.

Vancouver:

Gamachchi A. Mathematical models for insider threat mitigation. [Internet] [Thesis]. RMIT University; 2017. [cited 2021 Jan 22]. Available from: http://researchbank.rmit.edu.au/view/rmit:162338.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gamachchi A. Mathematical models for insider threat mitigation. [Thesis]. RMIT University; 2017. Available from: http://researchbank.rmit.edu.au/view/rmit:162338

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

11. Morgan, Deanne. Assessing Terrorist Cyber Threats: Engineering a Functional Construct.

Degree: 2014, University of North Texas

 Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known… (more)

Subjects/Keywords: terrorism; intelligence analysis; cyber threat; cyberterrorism; analysis instrument; intelligence; Cyberterrorism  – Risk assessment.; Cyberinfrastructure  – Security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morgan, D. (2014). Assessing Terrorist Cyber Threats: Engineering a Functional Construct. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc799463/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Morgan, Deanne. “Assessing Terrorist Cyber Threats: Engineering a Functional Construct.” 2014. Thesis, University of North Texas. Accessed January 22, 2021. https://digital.library.unt.edu/ark:/67531/metadc799463/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Morgan, Deanne. “Assessing Terrorist Cyber Threats: Engineering a Functional Construct.” 2014. Web. 22 Jan 2021.

Vancouver:

Morgan D. Assessing Terrorist Cyber Threats: Engineering a Functional Construct. [Internet] [Thesis]. University of North Texas; 2014. [cited 2021 Jan 22]. Available from: https://digital.library.unt.edu/ark:/67531/metadc799463/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Morgan D. Assessing Terrorist Cyber Threats: Engineering a Functional Construct. [Thesis]. University of North Texas; 2014. Available from: https://digital.library.unt.edu/ark:/67531/metadc799463/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Soltani Esterabadi, Afshin. Attack Analysis Methodologies .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsteknik, 2019, Chalmers University of Technology

 new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although… (more)

Subjects/Keywords: Automotive; Cybersecurity; Cyberattack; Attack surface; Attack analysis; Risk assessment; Threat analysis; Attack feasibility; Attack potentials.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soltani Esterabadi, A. (2019). Attack Analysis Methodologies . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Thesis, Chalmers University of Technology. Accessed January 22, 2021. http://hdl.handle.net/20.500.12380/300610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Web. 22 Jan 2021.

Vancouver:

Soltani Esterabadi A. Attack Analysis Methodologies . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/20.500.12380/300610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soltani Esterabadi A. Attack Analysis Methodologies . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Lin, Yi-ling. Strategic Development of Manufacturers âThe Case of Cooling Fan Company.

Degree: Master, Business Management, 2014, NSYSU

 This research carries on the purpose of the first and second materials by Taiwan cooling fan manufacturerâs applications analysis method. We choose the major global… (more)

Subjects/Keywords: threat of potential competitors; focusing strategy; cooling fan industry; strategy matrix analysis method; electronic components

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2014). Strategic Development of Manufacturers âThe Case of Cooling Fan Company. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yi-ling. “Strategic Development of Manufacturers âThe Case of Cooling Fan Company.” 2014. Thesis, NSYSU. Accessed January 22, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yi-ling. “Strategic Development of Manufacturers âThe Case of Cooling Fan Company.” 2014. Web. 22 Jan 2021.

Vancouver:

Lin Y. Strategic Development of Manufacturers âThe Case of Cooling Fan Company. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 Jan 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Strategic Development of Manufacturers âThe Case of Cooling Fan Company. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0629114-163827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universiteit Utrecht

14. Argyropoulos, N. Designing secure software systems: Combining goal-oriented modeling and risk management.

Degree: 2014, Universiteit Utrecht

 Software systems are broadly used to support the provision of e-services and the facilitation of business processes. Sensitive information is exchanged within such systems between… (more)

Subjects/Keywords: Security requirements engineering; risk management; socio-technical systems; information security; risk analysis; threat prioritization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Argyropoulos, N. (2014). Designing secure software systems: Combining goal-oriented modeling and risk management. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/301242

Chicago Manual of Style (16th Edition):

Argyropoulos, N. “Designing secure software systems: Combining goal-oriented modeling and risk management.” 2014. Masters Thesis, Universiteit Utrecht. Accessed January 22, 2021. http://dspace.library.uu.nl:8080/handle/1874/301242.

MLA Handbook (7th Edition):

Argyropoulos, N. “Designing secure software systems: Combining goal-oriented modeling and risk management.” 2014. Web. 22 Jan 2021.

Vancouver:

Argyropoulos N. Designing secure software systems: Combining goal-oriented modeling and risk management. [Internet] [Masters thesis]. Universiteit Utrecht; 2014. [cited 2021 Jan 22]. Available from: http://dspace.library.uu.nl:8080/handle/1874/301242.

Council of Science Editors:

Argyropoulos N. Designing secure software systems: Combining goal-oriented modeling and risk management. [Masters Thesis]. Universiteit Utrecht; 2014. Available from: http://dspace.library.uu.nl:8080/handle/1874/301242


Texas A&M University

15. Setiawan, Yanuar Ady. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.

Degree: MS, Nuclear Engineering, 2018, Texas A&M University

 The Estimate of Adversary Sequence Interruption (EASI) model is a single path analysis model to calculate the Probability of Interruption (PvI) of a Physical Protection… (more)

Subjects/Keywords: Physical Protection System (PPS); Stochastic (Monte Carlo) Approach; Multi-Path Analysis; Adversary Path; Insider Threat

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Setiawan, Y. A. (2018). ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/173597

Chicago Manual of Style (16th Edition):

Setiawan, Yanuar Ady. “ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.” 2018. Masters Thesis, Texas A&M University. Accessed January 22, 2021. http://hdl.handle.net/1969.1/173597.

MLA Handbook (7th Edition):

Setiawan, Yanuar Ady. “ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.” 2018. Web. 22 Jan 2021.

Vancouver:

Setiawan YA. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. [Internet] [Masters thesis]. Texas A&M University; 2018. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1969.1/173597.

Council of Science Editors:

Setiawan YA. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. [Masters Thesis]. Texas A&M University; 2018. Available from: http://hdl.handle.net/1969.1/173597


Brno University of Technology

16. Vrbecký, Tomáš. Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market.

Degree: 2020, Brno University of Technology

 This diploma thesis deals with the issue of risks associated with e-commerce of a company operating in the B2B market. The introductory part is devoted… (more)

Subjects/Keywords: Analýza rizik; e-commerce; FMEA; SEO; hrozba; Risk analysis; e-commerce; FMEA; SEO; threat

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vrbecký, T. (2020). Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/191041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vrbecký, Tomáš. “Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market.” 2020. Thesis, Brno University of Technology. Accessed January 22, 2021. http://hdl.handle.net/11012/191041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vrbecký, Tomáš. “Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market.” 2020. Web. 22 Jan 2021.

Vancouver:

Vrbecký T. Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/11012/191041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vrbecký T. Rizika elektronického obchodování v podniku na B2B trhu: The Risks of e-commerce in a Company on the B2B Market. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/191041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Florida

17. Wolfberg, William. The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe.

Degree: 2012, University of South Florida

 Western nations continue to face potential attacks from violent extremist organizations waging a campaign of violence in the name of political Islam. Though these attacks… (more)

Subjects/Keywords: Global Terrorism; Islamic Extremists; National Security; Population Studies; Threat Analysis; Political Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wolfberg, W. (2012). The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/4421

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wolfberg, William. “The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe.” 2012. Thesis, University of South Florida. Accessed January 22, 2021. https://scholarcommons.usf.edu/etd/4421.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wolfberg, William. “The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe.” 2012. Web. 22 Jan 2021.

Vancouver:

Wolfberg W. The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe. [Internet] [Thesis]. University of South Florida; 2012. [cited 2021 Jan 22]. Available from: https://scholarcommons.usf.edu/etd/4421.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wolfberg W. The Homegrown Jihad: A Comparative Study of Youth Radicalization in the United States and Europe. [Thesis]. University of South Florida; 2012. Available from: https://scholarcommons.usf.edu/etd/4421

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Maryland

18. Van Brakle, Mischelle. The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa.

Degree: Criminology and Criminal Justice, 2012, University of Maryland

 In this dissertation, I examined the relationship between two socio-legal and two political macro level reforms in South Africa on levels of anti-apartheid, separatist and… (more)

Subjects/Keywords: Criminology; South African studies; Ethnic Terrorism; Power Threat Hypothesis; South Africa; Time Series Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Brakle, M. (2012). The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa. (Thesis). University of Maryland. Retrieved from http://hdl.handle.net/1903/12794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Brakle, Mischelle. “The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa.” 2012. Thesis, University of Maryland. Accessed January 22, 2021. http://hdl.handle.net/1903/12794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Brakle, Mischelle. “The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa.” 2012. Web. 22 Jan 2021.

Vancouver:

Van Brakle M. The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa. [Internet] [Thesis]. University of Maryland; 2012. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1903/12794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Brakle M. The Impact of Macro Level Grievance Resolution on Terrorism and Political Violence in South Africa. [Thesis]. University of Maryland; 2012. Available from: http://hdl.handle.net/1903/12794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

19. Lewis, Michael. Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis.

Degree: MS, Clincal Psychology, 2018, Virginia Tech

 To date, most clinical psychology research has been based on the Diagnostic and Statistical Manual of Mental Disorders (DSM), which is a catalog of mental… (more)

Subjects/Keywords: Fear Learning; Threat Conditioning; Latent Growth Mixture Modeling; Latent Class Growth Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, M. (2018). Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83837

Chicago Manual of Style (16th Edition):

Lewis, Michael. “Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis.” 2018. Masters Thesis, Virginia Tech. Accessed January 22, 2021. http://hdl.handle.net/10919/83837.

MLA Handbook (7th Edition):

Lewis, Michael. “Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis.” 2018. Web. 22 Jan 2021.

Vancouver:

Lewis M. Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/10919/83837.

Council of Science Editors:

Lewis M. Fear Conditioning as an Intermediate Phenotype: An RDoC Inspired Methodological Analysis. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83837

20. Hill, Kara Norman. Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense.

Degree: PhD, Engineering Management, 2012, Old Dominion University

  Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function?… (more)

Subjects/Keywords: Homeland security; Risk perception; Threat assessment; Vulnerability; Defense and Security Studies; Operational Research; Risk Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hill, K. N. (2012). Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense. (Doctoral Dissertation). Old Dominion University. Retrieved from 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74

Chicago Manual of Style (16th Edition):

Hill, Kara Norman. “Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense.” 2012. Doctoral Dissertation, Old Dominion University. Accessed January 22, 2021. 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74.

MLA Handbook (7th Edition):

Hill, Kara Norman. “Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense.” 2012. Web. 22 Jan 2021.

Vancouver:

Hill KN. Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense. [Internet] [Doctoral dissertation]. Old Dominion University; 2012. [cited 2021 Jan 22]. Available from: 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74.

Council of Science Editors:

Hill KN. Risk Quadruplet: Integrating Assessments of Threat, Vulnerability, Consequence, and Perception for Homeland Security and Homeland Defense. [Doctoral Dissertation]. Old Dominion University; 2012. Available from: 9781267395924 ; https://digitalcommons.odu.edu/emse_etds/74


Linköping University

21. Vestlund, Christian. Threat Analysis on Vehicle Computer Systems.

Degree: Computer and Information Science, 2010, Linköping University

  Vehicles have been around in our society for over a century, until recently they have been standalone systems. With increased amounts of initiatives to… (more)

Subjects/Keywords: Vehicle computer system; threat; threat analysis; fault tree; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vestlund, C. (2010). Threat Analysis on Vehicle Computer Systems. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vestlund, Christian. “Threat Analysis on Vehicle Computer Systems.” 2010. Thesis, Linköping University. Accessed January 22, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vestlund, Christian. “Threat Analysis on Vehicle Computer Systems.” 2010. Web. 22 Jan 2021.

Vancouver:

Vestlund C. Threat Analysis on Vehicle Computer Systems. [Internet] [Thesis]. Linköping University; 2010. [cited 2021 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vestlund C. Threat Analysis on Vehicle Computer Systems. [Thesis]. Linköping University; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

22. Van Alphen, H.F. Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis.

Degree: 2015, Leiden University

 The People’s Republic of China’s (PRC’s) growing economic power has been frequently linked with its growing political and military power. Academic articles and Indian newspapers… (more)

Subjects/Keywords: maritime silk road; discourse analysis; India; China; string of pearls; identity; threat perceptions; media representations; indian ocean region

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Alphen, H. F. (2015). Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/34481

Chicago Manual of Style (16th Edition):

Van Alphen, H F. “Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis.” 2015. Masters Thesis, Leiden University. Accessed January 22, 2021. http://hdl.handle.net/1887/34481.

MLA Handbook (7th Edition):

Van Alphen, H F. “Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis.” 2015. Web. 22 Jan 2021.

Vancouver:

Van Alphen HF. Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis. [Internet] [Masters thesis]. Leiden University; 2015. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1887/34481.

Council of Science Editors:

Van Alphen HF. Indian Perceptions of the 21st Century Maritime Silk Road: a Discourse Analysis. [Masters Thesis]. Leiden University; 2015. Available from: http://hdl.handle.net/1887/34481


Leiden University

23. Lennep, Tove van. The UNHCR in the UK: Guardian of Refugee Protection?.

Degree: 2018, Leiden University

 As the first of its kind, this paper evaluates the UNHCR's construction of refugees in its annual campaigns between 2011 and 2016. First establishing the… (more)

Subjects/Keywords: UNHCR; anti-refugee sentiment; United Kingdom; Integrated Threat Theory; anti-refugee discourse; discourse analysis; UNHCR campaigns; refugee protection norms; stereotypes; postcolonialism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lennep, T. v. (2018). The UNHCR in the UK: Guardian of Refugee Protection?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/65067

Chicago Manual of Style (16th Edition):

Lennep, Tove van. “The UNHCR in the UK: Guardian of Refugee Protection?.” 2018. Masters Thesis, Leiden University. Accessed January 22, 2021. http://hdl.handle.net/1887/65067.

MLA Handbook (7th Edition):

Lennep, Tove van. “The UNHCR in the UK: Guardian of Refugee Protection?.” 2018. Web. 22 Jan 2021.

Vancouver:

Lennep Tv. The UNHCR in the UK: Guardian of Refugee Protection?. [Internet] [Masters thesis]. Leiden University; 2018. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1887/65067.

Council of Science Editors:

Lennep Tv. The UNHCR in the UK: Guardian of Refugee Protection?. [Masters Thesis]. Leiden University; 2018. Available from: http://hdl.handle.net/1887/65067


Brno University of Technology

24. Jacko, Jerguš. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.

Degree: 2020, Brno University of Technology

 Main goal of this thesis is to create an web application platform, which provides simplified characterization, adaptation and exchange of cyber threat incidents using the… (more)

Subjects/Keywords: STIX; TAXII; CybOX; IDEA; spracovanie bezpečnostných hrozieb; výmena bezpečnostných hrozieb; STIX; TAXII; CybOX; IDEA; cyber thrat analysis; cyber threat exchange

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacko, J. (2020). Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/189758

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2020. Thesis, Brno University of Technology. Accessed January 22, 2021. http://hdl.handle.net/11012/189758.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2020. Web. 22 Jan 2021.

Vancouver:

Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/11012/189758.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/189758

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Vermont

25. McCleary-Gaddy, Asia. A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern.

Degree: PhD, Psychology, 2018, University of Vermont

  Past research indicates that having a similar life experience as another person leads to greater empathic concern towards that person. Two studies empirically investigated… (more)

Subjects/Keywords: Affirmative Action; Empathy; Identity threat; Intergroup interactions; Merit; White Privilege; Experimental Analysis of Behavior; Social Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McCleary-Gaddy, A. (2018). A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern. (Doctoral Dissertation). University of Vermont. Retrieved from https://scholarworks.uvm.edu/graddis/862

Chicago Manual of Style (16th Edition):

McCleary-Gaddy, Asia. “A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern.” 2018. Doctoral Dissertation, University of Vermont. Accessed January 22, 2021. https://scholarworks.uvm.edu/graddis/862.

MLA Handbook (7th Edition):

McCleary-Gaddy, Asia. “A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern.” 2018. Web. 22 Jan 2021.

Vancouver:

McCleary-Gaddy A. A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern. [Internet] [Doctoral dissertation]. University of Vermont; 2018. [cited 2021 Jan 22]. Available from: https://scholarworks.uvm.edu/graddis/862.

Council of Science Editors:

McCleary-Gaddy A. A Social Identity Threat To Merit: The Effects Of Similar Experience On Empathic Concern. [Doctoral Dissertation]. University of Vermont; 2018. Available from: https://scholarworks.uvm.edu/graddis/862


University of Bradford

26. Munir, Rashid. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.

Degree: PhD, 2014, University of Bradford

 Cisco 2014 Annual Security Report clearly outlines the evolution of the threat landscape and the increase of the number of attacks. The UK government in… (more)

Subjects/Keywords: 005.8; Enterprise network security; Vulnerability analysis; Security assessment; Risk; Threat detection; Common Vulnerability Scoring System (CVSS)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Munir, R. (2014). A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/14251

Chicago Manual of Style (16th Edition):

Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Doctoral Dissertation, University of Bradford. Accessed January 22, 2021. http://hdl.handle.net/10454/14251.

MLA Handbook (7th Edition):

Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Web. 22 Jan 2021.

Vancouver:

Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Internet] [Doctoral dissertation]. University of Bradford; 2014. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/10454/14251.

Council of Science Editors:

Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Doctoral Dissertation]. University of Bradford; 2014. Available from: http://hdl.handle.net/10454/14251


Wilfrid Laurier University

27. Wang, Wan. Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement.

Degree: 2018, Wilfrid Laurier University

 We examine the novel proposition that disagreement on matters of opinion may threaten narcissists’ self-esteem and cause them to express dismissiveness of differing opinions and… (more)

Subjects/Keywords: narcissism; verbal aggression; hostility; self-threat; self-affirmation; flaming; Experimental Analysis of Behavior; Personality and Social Contexts; Quantitative Psychology; Social Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, W. (2018). Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement. (Thesis). Wilfrid Laurier University. Retrieved from https://scholars.wlu.ca/etd/2004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Wan. “Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement.” 2018. Thesis, Wilfrid Laurier University. Accessed January 22, 2021. https://scholars.wlu.ca/etd/2004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Wan. “Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement.” 2018. Web. 22 Jan 2021.

Vancouver:

Wang W. Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement. [Internet] [Thesis]. Wilfrid Laurier University; 2018. [cited 2021 Jan 22]. Available from: https://scholars.wlu.ca/etd/2004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang W. Narcissistic Intolerance: Verbal Hostility and Dismissiveness in Response to Subjective Disagreement. [Thesis]. Wilfrid Laurier University; 2018. Available from: https://scholars.wlu.ca/etd/2004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

28. Gong, Xuwei. Security Threats and Countermeasures for Connected Vehicles.

Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH

With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security… (more)

Subjects/Keywords: Connected vehicle; Use case; Threat analysis; Countermeasures; anslutna fordon; användningsfall; hotanalys; motåtgärd; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gong, X. (2019). Security Threats and Countermeasures for Connected Vehicles. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gong, Xuwei. “Security Threats and Countermeasures for Connected Vehicles.” 2019. Thesis, KTH. Accessed January 22, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gong, Xuwei. “Security Threats and Countermeasures for Connected Vehicles.” 2019. Web. 22 Jan 2021.

Vancouver:

Gong X. Security Threats and Countermeasures for Connected Vehicles. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gong X. Security Threats and Countermeasures for Connected Vehicles. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rice University

29. Piersall, Paul. Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers.

Degree: DMA, Music, 2012, Rice University

 As an accepted genre of female composition, song lies in a unique position among musical genres. This allows it to stand largely outside the area… (more)

Subjects/Keywords: Feminine style; Heinrich Heine; Grundgestalt analysis; Ich Stand in Dunkeln Traumen; Stereotype threat; Compositional choice in song; Vocal performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Piersall, P. (2012). Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers. (Doctoral Dissertation). Rice University. Retrieved from http://hdl.handle.net/1911/64636

Chicago Manual of Style (16th Edition):

Piersall, Paul. “Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers.” 2012. Doctoral Dissertation, Rice University. Accessed January 22, 2021. http://hdl.handle.net/1911/64636.

MLA Handbook (7th Edition):

Piersall, Paul. “Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers.” 2012. Web. 22 Jan 2021.

Vancouver:

Piersall P. Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers. [Internet] [Doctoral dissertation]. Rice University; 2012. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/1911/64636.

Council of Science Editors:

Piersall P. Gender and Compositional Choice: Four Songs on a Poem of Heinrich Heine by Female and Male Composers. [Doctoral Dissertation]. Rice University; 2012. Available from: http://hdl.handle.net/1911/64636


Brno University of Technology

30. Jacko, Jerguš. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.

Degree: 2019, Brno University of Technology

 Main goal of this thesis is to create an web application platform, which provides simplified characterization, adaptation and exchange of cyber threat incidents using the… (more)

Subjects/Keywords: STIX; TAXII; CybOX; IDEA; spracovanie bezpečnostných hrozieb; výmena bezpečnostných hrozieb; STIX; TAXII; CybOX; IDEA; cyber thrat analysis; cyber threat exchange

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacko, J. (2019). Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61987

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2019. Thesis, Brno University of Technology. Accessed January 22, 2021. http://hdl.handle.net/11012/61987.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jacko, Jerguš. “Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform.” 2019. Web. 22 Jan 2021.

Vancouver:

Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 22]. Available from: http://hdl.handle.net/11012/61987.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jacko J. Platforma pro zpracování hrozeb: Cyber Threat Intelligence Platform. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/61987

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4]

.