Academic literature on the topic 'Threat Assessment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat Assessment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threat Assessment"

1

Chandler, Gena E., and Jennifer Sano-Franchini. "Threat Assessment." Pedagogy 20, no. 1 (January 1, 2020): 87–100. http://dx.doi.org/10.1215/15314200-7879069.

Full text
Abstract:
While the term neoliberalism is commonly used to explain libertarian and conservative economic perspectives, its rapidly expanding contexts influence every aspect of our cultural environment, even the contexts of higher education. This article explores how neoliberal ideology affects the contemporary teaching environment for women of color teaching ideological critique.
APA, Harvard, Vancouver, ISO, and other styles
2

Gelles, Michael G., Kim Sasaki-Swindle, and Russell E. Palarea. "Threat Assessment." Journal of Threat Assessment 2, no. 1 (January 2002): 55–66. http://dx.doi.org/10.1300/j177v02n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

KRASIŃSKI, MSc, Wojciech. "THREAT ASSESSMENT IN THE NATIONAL CRISIS MANAGEMENT PLANS IN POLAND AFTER 2010." Zeszyty Naukowe Akademii Sztuki Wojennej 117, no. 4 (July 29, 2020): 58–68. http://dx.doi.org/10.5604/01.3001.0014.3424.

Full text
Abstract:
The article discusses threat assessment in consecutive National Crisis Management Plans in Poland after 2010. The scope of the article is limited to the assessment of those threats that may have an impact at the state level and which are included in the National Crisis Management Plan. A general approach to threat assessment for the purposes of national crisis management plans has been taken. A reference to the accuracy of consecutive threat assessments in the context of the occurrence of real crises is included later in the article. In the final part of the article, the perspectives for threat assessment are discussed. Due attention is paid to threats which have an increased likelihood of occurring and the severest consequences.
APA, Harvard, Vancouver, ISO, and other styles
4

MUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.

Full text
Abstract:
Loss of wildlife, encroachment on wild lands and conflicts between protected areas and neighbouring communities continue to threaten the integrity of protected areas (PAs) in Uganda. To increase support from local communities and ensure long-term sustainability for Uganda's PAs, a policy of community-based conservation was introduced in 1988 as a management approach in seven PAs. The effectiveness of the community-based approach for reducing threats was compared to conventional PA management by conducting a threat reduction assessment at 16 PAs, seven with community-based approaches and nine without. Additional data collected using document reviews, interviews with government officials, and surveys of PA wardens were compared with the threat reduction assessments. Twenty-three primary threats were identified at PAs. Local game poaching was the most common threat. The threat reduction assessment indices of community-based PAs (mean=49.0±12) were not significantly different from those of conventional PAs (mean=37.96±21.6). Some specific threats, such as bush burning, logging, encroachment and unclear boundaries, seemed to be better mitigated at community-based PAs. Management approaches at all PAs mitigated fewer than half of the identified threats. Management approaches are needed that directly target PA threats, go beyond PA boundaries by involving additional government departments, link people's livelihoods to conservation efforts and strengthen PA institutions.
APA, Harvard, Vancouver, ISO, and other styles
5

Pardue, Harold, Jeffrey P. Landry, and Alec Yasinsac. "E-Voting Risk Assessment." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 19–35. http://dx.doi.org/10.4018/jisp.2011070102.

Full text
Abstract:
Approximately 25% (according to http://verifiedvoting.com/) of voting jurisdictions use direct recording electronic systems to record votes. Accurate tabulation of voter intent is critical to safeguard this fundamental act of democracy: voting. Electronic voting systems are known to be vulnerable to attack. Assessing risk to these systems requires a systematic treatment and cataloging of threats, vulnerabilities, technologies, controls, and operational environments. This paper presents a threat tree for direct recording electronic (DRE) voting systems. The threat tree is organized as a hierarchy of threat actions, the goal of which is to exploit a system vulnerability in the context of specific technologies, controls, and operational environment. As an abstraction, the threat tree allows the analyst to reason comparatively about threats. A panel of elections officials, security experts, academics, election law attorneys, representatives from governmental agencies, voting equipment vendors, and voting equipment testing labs vetted the DRE threat tree. The authors submit that the DRE threat tree supports both individual and group risk assessment processes and techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Deng, Fang, Xinan Liu, Zhihong Peng, and Jie Chen. "A Threat Assessment Method Based on Hierarchies and Modules." Journal of Advanced Computational Intelligence and Intelligent Informatics 18, no. 1 (January 20, 2014): 93–99. http://dx.doi.org/10.20965/jaciii.2014.p0093.

Full text
Abstract:
With the development of low-level data fusion technology, threat assessment, which is a part of high-level data fusion, is recognized by an increasing numbers of people. However, the method to solve the problem of threat assessment for various kinds of targets and attacks is unknown. Hence, a threat assessment method is proposed in this paper to solve this problem. This method includes tertiary assessments: information classification, reorganization, and summary. In the tertiary assessments model, various threats with multi-class targets and attacks can be comprehensively assessed. A case study with specific algorithms and scenarios is shown to prove the validity and rationality of this method.
APA, Harvard, Vancouver, ISO, and other styles
7

Nostro, Nicola, Andrea Ceccarelli, Andrea Bondavalli, and Francesco Brancati. "Insider Threat Assessment." ACM SIGOPS Operating Systems Review 48, no. 2 (December 5, 2014): 3–12. http://dx.doi.org/10.1145/2694737.2694740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.

Full text
Abstract:
The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.
APA, Harvard, Vancouver, ISO, and other styles
9

Strong, Ken, and Dewey Cornell. "Student Threat Assessment in Memphis City Schools: A Descriptive Report." Behavioral Disorders 34, no. 1 (November 2008): 42–54. http://dx.doi.org/10.1177/019874290803400104.

Full text
Abstract:
Threat assessment has been widely recommended as a violence prevention approach for schools, but there are few reports of its implementation. Memphis City Schools adapted the Virginia threat assessment guidelines (Cornell & Sheras, 2006) for use by a centralized team serving 194 schools and a student population of 118,000. This article describes 209 student threats referred for assessment during a single school year and the resulting educational placements and disciplinary consequences. There were no reports of students carrying out any of the violent threats. These results support further examination of student threat assessment as a promising approach to dealing with student threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Huddleston, S. H., and D. E. Brown. "A Statistical Threat Assessment." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 39, no. 6 (November 2009): 1307–15. http://dx.doi.org/10.1109/tsmca.2009.2027611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Threat Assessment"

1

Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holliday, Cyrus E. "Threat assessment in the new world order." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/30294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mitchell, Melanie. "No idle threat: Precursors to action in threateners with mental illness." Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/180839/1/Melanie_Mitchell_Thesis.pdf.

Full text
Abstract:
This thesis examined threats of violence made by persons with mental illness and in particular, who acts on violent threats and who does not. Threats were common occurrences and 55% per cent of threateners went on to be violent. Several predictors of violence were identified, including younger age, intellectual impairment and active mood and/or psychotic symptoms. Methods for preventing, identifying and managing threat-related violence were explored. This research has practical implications for those working in mental health settings and those supporting people who have a mental illness and make threats of violence.
APA, Harvard, Vancouver, ISO, and other styles
4

Eidehall, Andreas. "Tracking and threat assessment for automotive collision avoidance." Doctoral thesis, Linköping : Department of Electrical Engineering, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Wade Robert. "A COMPARATIVE CASE STUDY ANALYSIS OF CAMPUS VIOLENCE PREVENTION PLANS AT THREE ILLINOIS HIGHER EDUCATION INSTITUTIONS." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/728.

Full text
Abstract:
The postsecondary acts of violence at Virginia Technical University (VT) and Northern Illinois University (NIU) forced Illinois legislators to approve the Campus Security Enhancement Act in 2008 (110 ILCS 12/20). The Act requires all private and public postsecondary education institutions to develop a Campus Violence Prevention Plan (CVPP), as well as two multi-disciplinary groups to implement the plan and address behaviors of concern, a Campus Violence Prevention Committee (CVPC) and Threat Assessment Team (TAT) (CESA, 2008). Recent research has uncovered that several institutions within the state have not completed their CVPP and the Act has left some institutions unsure of which agency to report to and how to effectively develop and implement their CVPP (Gregory, 2012; Pawlowski & Manetti, 2011). This research study is the first investigation into the groundbreaking Illinois legislation. Utilizing a case study design, the purpose of the research study is to explore how three Illinois postsecondary institutions of similar Carnegie classifications created, implemented, assessed, and addressed challenges in developing their CVPP's. One-on-one interviews and document analysis were used to gather data. With-in case analysis and cross-case analysis were performed to generated research themes to answer the research questions. Four cross-case analysis themes were created to answer the corresponding research questions. Conclusions from this study may assist other Illinois postsecondary institutions in developing their CVPP's and decrease the likelihood of violence occurring in the postsecondary environment.
APA, Harvard, Vancouver, ISO, and other styles
6

Ganey, Harriss. "THE EFFECTS OF SECONDARY TASK DEMANDON THE ASSESSMENT OF THREAT." Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3722.

Full text
Abstract:
Threat perception is an important issue in today's world. As the line between hostile and non-hostile entities is blurred, it becomes more important for individuals to clearly distinguish between those who would present danger and those who would not. This series of experiments tested whether observers engaged in a dual-task paradigm perceived a greater amount of threat from target stimuli than they did when they were engaged in the threat task alone. The first experiment revealed that observers rated targets as more threatening when they were engaged in the additional task than when they only rated the targets themselves. Response time to the targets was also slower when a secondary task was present. This difference was more pronounced when the secondary task was presented via the auditory channel. Participants also rated overall workload higher when performing a secondary task, with the highest ratings being associated with the dual-task auditory condition. In the second experiment, the design crossed sensory modality with the presence or non-presence of threat. Inter-stimulus interval was also manipulated. The presence of threat was associated with faster response times, though when both tasks had threat components, response time was not the fastest. Additionally, when images came first in the stimulus pairs, observers were slower to respond to the first stimulus than when the sounds were presented first. Results supported the conclusion that additional task loading can affect the perception of threat. The modality of the additional task seems to also play a role in threat assessment performance. Results also led to the conclusion that threat-related visual stimuli are more challenging to process than threat-related auditory stimuli. Future research can now investigate how different types of tasks affect the threat perception task. Implications for better training of soldiers and for the design of automated systems are presented.
Ph.D.
Department of Psychology
Sciences
Psychology
APA, Harvard, Vancouver, ISO, and other styles
7

Danielsson, Simon. "Monte Carlo based Threat Assessment: An in depth Analysis." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9480.

Full text
Abstract:

This thesis presents improvements and extensions of a previously presented threat assessment algorithm. The algorithm uses Monte Carlo simulation to find threats in a road scene. It is shown that, by using a wider sample distribution and only apply the most likely samples from the Monte Carlo simulation, for the threat assessment, improved results are obtained. By using this method more realistic paths will be chosen by the simulated vehicles and more complex traffic situations will be adequately handled.

An improvement of the dynamic model is also suggested, which improves the realism of the Monte Carlo simulations. Using the new dynamic model less false positive and more valid threats are detected.

A systematic method to choose parameters in a stochastic space, using optimisation, is suggested. More realistic trajectories can be chosen, by applying this method on the parameters that represents the human behaviour, in the threat assessment algorithm.

A new definition of obstacles in a road scene is suggested, dividing them into two groups, Hard and Soft obstacles. A change to the resampling step, in the Monte Carlo simulation, using the soft and hard obstacles is also suggested.

APA, Harvard, Vancouver, ISO, and other styles
8

Mnjama, Javan Joshua. "Towards a threat assessment framework for consumer health wearables." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/62649.

Full text
Abstract:
The collection of health data such as physical activity, consumption and physiological data through the use of consumer health wearables via fitness trackers are very beneficial for the promotion of physical wellness. However, consumer health wearables and their associated applications are known to have privacy and security concerns that can potentially make the collected personal health data vulnerable to hackers. These concerns are attributed to security theoretical frameworks not sufficiently addressing the entirety of privacy and security concerns relating to the diverse technological ecosystem of consumer health wearables. The objective of this research was therefore to develop a threat assessment framework that can be used to guide the detection of vulnerabilities which affect consumer health wearables and their associated applications. To meet this objective, the Design Science Research methodology was used to develop the desired artefact (Consumer Health Wearable Threat Assessment Framework). The framework is comprised of fourteen vulnerabilities classified according to Authentication, Authorization, Availability, Confidentiality, Non-Repudiation and Integrity. Through developing the artefact, the threat assessment framework was demonstrated on two fitness trackers and their associated applications. It was discovered, that the framework was able to identify how these vulnerabilities affected, these two test cases based on the classification categories of the framework. The framework was also evaluated by four security experts who assessed the quality, utility and efficacy of the framework. Experts, supported the use of the framework as a relevant and comprehensive framework to guide the detection of vulnerabilities towards consumer health wearables and their associated applications. The implication of this research study is that the framework can be used by developers to better identify the vulnerabilities of consumer health wearables and their associated applications. This will assist in creating a more securer environment for the storage and use of health data by consumer health wearables.
APA, Harvard, Vancouver, ISO, and other styles
9

Le, Guillarme Nicolas. "A game-theoretic planning framework for intentional threat assessment." Caen, 2016. http://www.theses.fr/2016CAEN2046.

Full text
Abstract:
Dans cette thèse, nous considérons le problème de l’évaluation de la menace, une tâche de fusion d’informations de haut niveau dont l'objectif principal est d’assister un décideur dans l'acquisition d'un niveau de conscience de la situation suffisamment élevé pour prendre des décisions appropriées dans un environnement potentiellement hostile, dynamique et incertain. L'évaluation de la menace consiste à prédire l'occurrence d’événements néfastes intentionnels et peut donc être vue comme un cas particulier des problèmes de reconnaissance de l’intention et de prédiction du comportement. L'évaluation de la menace trouve son utilité dans des situations antagonistes, où plusieurs agents tentent d’atteindre des objectifs incompatibles dans un environnement partagé. De telles situations peuvent être modélisées et analysées à l'aide d'outils de la théorie des jeux qui propose un cadre formel pour l’étude des interactions stratégiques entre décideurs rationnels. La principale contribution de cette thèse consiste en un cadre génératif pour l’évaluation de la menace et l'aide à la décision baptisé TARGET (Threat Assessment and Response using GamE-Theory) qui combine une modélisation du comportement d’un agent hostile basée sur la théorie des jeux stochastiques et une méthode de reconnaissance d’intention d'un adversaire par planification inverse. Le problème de reconnaissance d'intention d’un adversaire étant caractérisé par l'hostilité de l'agent observé vis à vis du processus de reconnaissance, nous proposons un ensemble de techniques permettant de rendre notre système robuste à la tromperie et à la dissimulation
In this thesis, we address the problem of threat assessment, a high-level information fusion task whose main objective is to assist a decision maker in achieving a proper level of situation awareness so as to make effective and proactive decisions in possibly hostile, dynamic, and uncertain environments. Threat assessment is the problem of predicting intentional threat events and therefore it can be seen as a specific aspect of the problems of adversarial intention recognition and behavior prediction. Threat assessment is needed in adversarial situations, where several agents are competing to achieve conflicting goals in a shared environment. Adversarial situations can be modeled and analyzed using game theory which provides a formal framework for studying strategic interactions between rational decision makers. The main contribution of this thesis consists of a generative framework for threat assessment and decision support called TARGET (Threat Assessment and Response using GamE-Theory) which combines a game-theoretic model of adversarial behavior and an inverse-planning-based approach to adversarial intention recognition. Adversarial intention recognition is characterized by the hostility of the observed agent to the recognition process. To address this issue, we propose a set of techniques that make our system robust to deception and concealment
APA, Harvard, Vancouver, ISO, and other styles
10

Sethi, Amita. "Potential denial of service threat assessment for cognitive radios." Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1453572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Threat Assessment"

1

National Security Council (U.S.), ed. International crime threat assessment. [Washington, D.C: Executive Office of the President, National Security Council?, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. National Drug Intelligence Center., ed. Virginia drug threat assessment. Johnstown, PA: National Drug Intelligence Center, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. National Drug Intelligence Center., ed. Interagency domestic heroin threat assessment. Johnstown, PA (319 Washington Street, 5th Floor, Johnstown, 15901-1622): U.S. Department of Justice, National Drug Intelligence Center, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

National Drug Intelligence Center (U.S.). National gang threat assessment: 2009. Washington, DC: National Drug Intelligence Center, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Leson, Joel. Assessing and managing the terrorism threat. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Müller, Harald. Terrorism, proliferation: A European threat assessment. Paris: European Union Institute for Security Studies, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

W, Merkidze Albert, ed. Terrorism issues: Threat assessment, consequences and prevention. New York: Nova Science Publishers, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Parachini, John. Combating terrorism: Assessing the threat of biological terrorism. Santa Monica, CA: RAND, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schneller, Jay. Psychosocial evaluation & threat risk assessment: Professional manual. Lutz, FL: Psychological Assessment Resources, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Global threat: Target-centered assessment and management. Westport, Conn: Praeger Security International, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Threat Assessment"

1

Cornell, Dewey G. "Threat Assessment." In The Wiley Handbook on Violence in Education, 37–52. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781118966709.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunt, V. Daniel. "Technology Assessment." In Mechatronics:Japan’s Newest Threat, 267–309. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1063-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Steinberg, Alan N. "Threat Assessment Technology Development." In Modeling and Using Context, 490–500. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11508373_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hesterman, Jennifer. "Soft Target Threat Assessment." In Soft Target Hardening, 123–84. 2 Edition. | New York: Routledge, 2019. | Revised edition of the author’s Soft target hardening, [2015]: Routledge, 2018. http://dx.doi.org/10.4324/9780429422966-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hesterman, Jennifer. "Soft Target Threat Assessment." In Soft Target Hardening, 185–245. 2 Edition. | New York: Routledge, 2019. | Revised edition of the author’s Soft target hardening, [2015]: Routledge, 2018. http://dx.doi.org/10.4324/9780429422966-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Young, Carl S. "Threat Scenarios." In Risk and the Theory of Security Risk Assessment, 49–60. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30600-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Young, Carl S. "Threat Scenario Complexity." In Risk and the Theory of Security Risk Assessment, 191–219. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30600-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Flannelly, Kevin J. "Evolutionary Threat Assessment Systems Theory." In Religious Beliefs, Evolutionary Psychiatry, and Mental Health in America, 125–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52488-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Callahan, Connie. "Threat Assessment in School Violence." In School Violence and Primary Prevention, 59–77. New York, NY: Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77119-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cornell, Dewey, and Pooja Datta. "Threat Assessment and Violence Prevention." In The Wiley Handbook of the Psychology of Mass Shootings, 351–71. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2016. http://dx.doi.org/10.1002/9781119048015.ch19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threat Assessment"

1

Dall, I. W. "Threat assessment without situation assessment." In 1999 Information, Decision and Control. Data and Information Fusion Symposium, Signal Processing and Communications Symposium and Decision and Control Symposium. Proceedings (Cat. No.99EX251). IEEE, 1999. http://dx.doi.org/10.1109/idc.1999.754185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gune, Archis, Vivek Kumar Mandal, Ayush Asawa, Vivek Shetty, and Deepak Karia. "Threat Assessment Industrial Robot." In 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT). IEEE, 2021. http://dx.doi.org/10.1109/rteict52294.2021.9573838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Arshad, Rabia Khan, and Farhan Nisar. "Novice threat model using SIEM system for threat assessment." In 2017 International Conference on Communication Technologies (ComTech). IEEE, 2017. http://dx.doi.org/10.1109/comtech.2017.8065753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bygdas, Erlend, Lars Andreassen Jaatun, Stian Brekken Antonsen, Anders Ringen, and Erlend Eiring. "Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon." In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2021. http://dx.doi.org/10.1109/cybersa52016.2021.9478215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Okello, N., and G. Thorns. "Threat assessment using bayesian networks." In Proceedings of the Sixth International Conference of Information Fusion. IEEE, 2003. http://dx.doi.org/10.1109/icif.2003.177361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mirchandani, Sheema, and Sam Adhikari. "Aerospace cybersecurity threat vector assessment." In ASCEND 2020. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2020. http://dx.doi.org/10.2514/6.2020-4116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Steinberg, A. N. "An approach to threat assessment." In 2005 7th International Conference on Information Fusion. IEEE, 2005. http://dx.doi.org/10.1109/icif.2005.1592001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stubberud, Stephen C., and Kathleen A. Kramer. "Threat assessment for GPS navigation." In 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA). IEEE, 2014. http://dx.doi.org/10.1109/inista.2014.6873632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lennox, Kristin P., and Lee Glascoe. "Constrained classification for infrastructure threat assessment." In 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lane, R. O., D. A. Nevell, S. D. Hayward, and T. W. Beaney. "Maritime anomaly detection and threat assessment." In 2010 13th International Conference on Information Fusion (FUSION 2010). IEEE, 2010. http://dx.doi.org/10.1109/icif.2010.5711998.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threat Assessment"

1

Patrick Treado, Oksana Klueva, and Jeffrey Beckstead. Airborne Particulate Threat Assessment. Office of Scientific and Technical Information (OSTI), December 2008. http://dx.doi.org/10.2172/966354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

West, D. J., R. A. Al-Ayat, and B. R. Judd. DOE site-specific threat assessment. Office of Scientific and Technical Information (OSTI), July 1985. http://dx.doi.org/10.2172/5053930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hwang, Tim. Deepfakes: A Grounded Threat Assessment. Center for Security and Emerging Technology, July 2020. http://dx.doi.org/10.51593/20190030.

Full text
Abstract:
The rise of deepfakes could enhance the effectiveness of disinformation efforts by states, political parties and adversarial actors. How rapidly is this technology advancing, and who in reality might adopt it for malicious ends? This report offers a comprehensive deepfake threat assessment grounded in the latest machine learning research on generative models.
APA, Harvard, Vancouver, ISO, and other styles
4

Powell, Troy C. External Threat Risk Assessment Algorithm (ExTRAA). Office of Scientific and Technical Information (OSTI), August 2017. http://dx.doi.org/10.2172/1379454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liebhaber, M. J., and B. A. Feher. Surface Warfare Threat Assessment: Requirements Definition. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada406337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holmberg, David G. BACnet wide area network security threat assessment. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.7009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liebhaber, Michael J., and Bela Feher. Air Threat Assessment: Research, Model, and Display Guidelines. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada458047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

DEPARTMENT OF DEFENSE WASHINGTON DC. Soviet Military Power: An Assessment of the Threat. Fort Belvoir, VA: Defense Technical Information Center, January 1988. http://dx.doi.org/10.21236/ada196828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CENTER FOR NAVAL ANALYSES ALEXANDRIA VA. The Post-Afghanistan IED Threat Assessment: Executive Summary. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada582113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ackerman, Gary. Radiological/Nuclear (RN) Terrorism: Global Assessment of Threat Intention Drivers. Office of Scientific and Technical Information (OSTI), November 2016. http://dx.doi.org/10.2172/1431197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography