Academic literature on the topic 'Threat Assessment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat Assessment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threat Assessment"
Chandler, Gena E., and Jennifer Sano-Franchini. "Threat Assessment." Pedagogy 20, no. 1 (January 1, 2020): 87–100. http://dx.doi.org/10.1215/15314200-7879069.
Full textGelles, Michael G., Kim Sasaki-Swindle, and Russell E. Palarea. "Threat Assessment." Journal of Threat Assessment 2, no. 1 (January 2002): 55–66. http://dx.doi.org/10.1300/j177v02n01_04.
Full textKRASIŃSKI, MSc, Wojciech. "THREAT ASSESSMENT IN THE NATIONAL CRISIS MANAGEMENT PLANS IN POLAND AFTER 2010." Zeszyty Naukowe Akademii Sztuki Wojennej 117, no. 4 (July 29, 2020): 58–68. http://dx.doi.org/10.5604/01.3001.0014.3424.
Full textMUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.
Full textPardue, Harold, Jeffrey P. Landry, and Alec Yasinsac. "E-Voting Risk Assessment." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 19–35. http://dx.doi.org/10.4018/jisp.2011070102.
Full textDeng, Fang, Xinan Liu, Zhihong Peng, and Jie Chen. "A Threat Assessment Method Based on Hierarchies and Modules." Journal of Advanced Computational Intelligence and Intelligent Informatics 18, no. 1 (January 20, 2014): 93–99. http://dx.doi.org/10.20965/jaciii.2014.p0093.
Full textNostro, Nicola, Andrea Ceccarelli, Andrea Bondavalli, and Francesco Brancati. "Insider Threat Assessment." ACM SIGOPS Operating Systems Review 48, no. 2 (December 5, 2014): 3–12. http://dx.doi.org/10.1145/2694737.2694740.
Full textSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Full textStrong, Ken, and Dewey Cornell. "Student Threat Assessment in Memphis City Schools: A Descriptive Report." Behavioral Disorders 34, no. 1 (November 2008): 42–54. http://dx.doi.org/10.1177/019874290803400104.
Full textHuddleston, S. H., and D. E. Brown. "A Statistical Threat Assessment." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 39, no. 6 (November 2009): 1307–15. http://dx.doi.org/10.1109/tsmca.2009.2027611.
Full textDissertations / Theses on the topic "Threat Assessment"
Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.
Full textHolliday, Cyrus E. "Threat assessment in the new world order." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/30294.
Full textMitchell, Melanie. "No idle threat: Precursors to action in threateners with mental illness." Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/180839/1/Melanie_Mitchell_Thesis.pdf.
Full textEidehall, Andreas. "Tracking and threat assessment for automotive collision avoidance." Doctoral thesis, Linköping : Department of Electrical Engineering, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8338.
Full textBrown, Wade Robert. "A COMPARATIVE CASE STUDY ANALYSIS OF CAMPUS VIOLENCE PREVENTION PLANS AT THREE ILLINOIS HIGHER EDUCATION INSTITUTIONS." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/728.
Full textGaney, Harriss. "THE EFFECTS OF SECONDARY TASK DEMANDON THE ASSESSMENT OF THREAT." Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3722.
Full textPh.D.
Department of Psychology
Sciences
Psychology
Danielsson, Simon. "Monte Carlo based Threat Assessment: An in depth Analysis." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9480.
Full textThis thesis presents improvements and extensions of a previously presented threat assessment algorithm. The algorithm uses Monte Carlo simulation to find threats in a road scene. It is shown that, by using a wider sample distribution and only apply the most likely samples from the Monte Carlo simulation, for the threat assessment, improved results are obtained. By using this method more realistic paths will be chosen by the simulated vehicles and more complex traffic situations will be adequately handled.
An improvement of the dynamic model is also suggested, which improves the realism of the Monte Carlo simulations. Using the new dynamic model less false positive and more valid threats are detected.
A systematic method to choose parameters in a stochastic space, using optimisation, is suggested. More realistic trajectories can be chosen, by applying this method on the parameters that represents the human behaviour, in the threat assessment algorithm.
A new definition of obstacles in a road scene is suggested, dividing them into two groups, Hard and Soft obstacles. A change to the resampling step, in the Monte Carlo simulation, using the soft and hard obstacles is also suggested.
Mnjama, Javan Joshua. "Towards a threat assessment framework for consumer health wearables." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/62649.
Full textLe, Guillarme Nicolas. "A game-theoretic planning framework for intentional threat assessment." Caen, 2016. http://www.theses.fr/2016CAEN2046.
Full textIn this thesis, we address the problem of threat assessment, a high-level information fusion task whose main objective is to assist a decision maker in achieving a proper level of situation awareness so as to make effective and proactive decisions in possibly hostile, dynamic, and uncertain environments. Threat assessment is the problem of predicting intentional threat events and therefore it can be seen as a specific aspect of the problems of adversarial intention recognition and behavior prediction. Threat assessment is needed in adversarial situations, where several agents are competing to achieve conflicting goals in a shared environment. Adversarial situations can be modeled and analyzed using game theory which provides a formal framework for studying strategic interactions between rational decision makers. The main contribution of this thesis consists of a generative framework for threat assessment and decision support called TARGET (Threat Assessment and Response using GamE-Theory) which combines a game-theoretic model of adversarial behavior and an inverse-planning-based approach to adversarial intention recognition. Adversarial intention recognition is characterized by the hostility of the observed agent to the recognition process. To address this issue, we propose a set of techniques that make our system robust to deception and concealment
Sethi, Amita. "Potential denial of service threat assessment for cognitive radios." Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1453572.
Full textBooks on the topic "Threat Assessment"
National Security Council (U.S.), ed. International crime threat assessment. [Washington, D.C: Executive Office of the President, National Security Council?, 2000.
Find full textUnited States. National Drug Intelligence Center., ed. Virginia drug threat assessment. Johnstown, PA: National Drug Intelligence Center, 2002.
Find full textUnited States. National Drug Intelligence Center., ed. Interagency domestic heroin threat assessment. Johnstown, PA (319 Washington Street, 5th Floor, Johnstown, 15901-1622): U.S. Department of Justice, National Drug Intelligence Center, 2000.
Find full textNational Drug Intelligence Center (U.S.). National gang threat assessment: 2009. Washington, DC: National Drug Intelligence Center, 2009.
Find full textLeson, Joel. Assessing and managing the terrorism threat. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 2005.
Find full textMüller, Harald. Terrorism, proliferation: A European threat assessment. Paris: European Union Institute for Security Studies, 2003.
Find full textW, Merkidze Albert, ed. Terrorism issues: Threat assessment, consequences and prevention. New York: Nova Science Publishers, 2007.
Find full textParachini, John. Combating terrorism: Assessing the threat of biological terrorism. Santa Monica, CA: RAND, 2001.
Find full textSchneller, Jay. Psychosocial evaluation & threat risk assessment: Professional manual. Lutz, FL: Psychological Assessment Resources, 2005.
Find full textGlobal threat: Target-centered assessment and management. Westport, Conn: Praeger Security International, 2008.
Find full textBook chapters on the topic "Threat Assessment"
Cornell, Dewey G. "Threat Assessment." In The Wiley Handbook on Violence in Education, 37–52. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781118966709.ch2.
Full textHunt, V. Daniel. "Technology Assessment." In Mechatronics:Japan’s Newest Threat, 267–309. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1063-1_9.
Full textSteinberg, Alan N. "Threat Assessment Technology Development." In Modeling and Using Context, 490–500. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11508373_37.
Full textHesterman, Jennifer. "Soft Target Threat Assessment." In Soft Target Hardening, 123–84. 2 Edition. | New York: Routledge, 2019. | Revised edition of the author’s Soft target hardening, [2015]: Routledge, 2018. http://dx.doi.org/10.4324/9780429422966-5.
Full textHesterman, Jennifer. "Soft Target Threat Assessment." In Soft Target Hardening, 185–245. 2 Edition. | New York: Routledge, 2019. | Revised edition of the author’s Soft target hardening, [2015]: Routledge, 2018. http://dx.doi.org/10.4324/9780429422966-6.
Full textYoung, Carl S. "Threat Scenarios." In Risk and the Theory of Security Risk Assessment, 49–60. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30600-7_3.
Full textYoung, Carl S. "Threat Scenario Complexity." In Risk and the Theory of Security Risk Assessment, 191–219. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30600-7_9.
Full textFlannelly, Kevin J. "Evolutionary Threat Assessment Systems Theory." In Religious Beliefs, Evolutionary Psychiatry, and Mental Health in America, 125–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52488-7_14.
Full textCallahan, Connie. "Threat Assessment in School Violence." In School Violence and Primary Prevention, 59–77. New York, NY: Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-77119-9_4.
Full textCornell, Dewey, and Pooja Datta. "Threat Assessment and Violence Prevention." In The Wiley Handbook of the Psychology of Mass Shootings, 351–71. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2016. http://dx.doi.org/10.1002/9781119048015.ch19.
Full textConference papers on the topic "Threat Assessment"
Dall, I. W. "Threat assessment without situation assessment." In 1999 Information, Decision and Control. Data and Information Fusion Symposium, Signal Processing and Communications Symposium and Decision and Control Symposium. Proceedings (Cat. No.99EX251). IEEE, 1999. http://dx.doi.org/10.1109/idc.1999.754185.
Full textGune, Archis, Vivek Kumar Mandal, Ayush Asawa, Vivek Shetty, and Deepak Karia. "Threat Assessment Industrial Robot." In 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT). IEEE, 2021. http://dx.doi.org/10.1109/rteict52294.2021.9573838.
Full textKhan, Arshad, Rabia Khan, and Farhan Nisar. "Novice threat model using SIEM system for threat assessment." In 2017 International Conference on Communication Technologies (ComTech). IEEE, 2017. http://dx.doi.org/10.1109/comtech.2017.8065753.
Full textBygdas, Erlend, Lars Andreassen Jaatun, Stian Brekken Antonsen, Anders Ringen, and Erlend Eiring. "Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon." In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2021. http://dx.doi.org/10.1109/cybersa52016.2021.9478215.
Full textOkello, N., and G. Thorns. "Threat assessment using bayesian networks." In Proceedings of the Sixth International Conference of Information Fusion. IEEE, 2003. http://dx.doi.org/10.1109/icif.2003.177361.
Full textMirchandani, Sheema, and Sam Adhikari. "Aerospace cybersecurity threat vector assessment." In ASCEND 2020. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2020. http://dx.doi.org/10.2514/6.2020-4116.
Full textSteinberg, A. N. "An approach to threat assessment." In 2005 7th International Conference on Information Fusion. IEEE, 2005. http://dx.doi.org/10.1109/icif.2005.1592001.
Full textStubberud, Stephen C., and Kathleen A. Kramer. "Threat assessment for GPS navigation." In 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA). IEEE, 2014. http://dx.doi.org/10.1109/inista.2014.6873632.
Full textLennox, Kristin P., and Lee Glascoe. "Constrained classification for infrastructure threat assessment." In 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107853.
Full textLane, R. O., D. A. Nevell, S. D. Hayward, and T. W. Beaney. "Maritime anomaly detection and threat assessment." In 2010 13th International Conference on Information Fusion (FUSION 2010). IEEE, 2010. http://dx.doi.org/10.1109/icif.2010.5711998.
Full textReports on the topic "Threat Assessment"
Patrick Treado, Oksana Klueva, and Jeffrey Beckstead. Airborne Particulate Threat Assessment. Office of Scientific and Technical Information (OSTI), December 2008. http://dx.doi.org/10.2172/966354.
Full textWest, D. J., R. A. Al-Ayat, and B. R. Judd. DOE site-specific threat assessment. Office of Scientific and Technical Information (OSTI), July 1985. http://dx.doi.org/10.2172/5053930.
Full textHwang, Tim. Deepfakes: A Grounded Threat Assessment. Center for Security and Emerging Technology, July 2020. http://dx.doi.org/10.51593/20190030.
Full textPowell, Troy C. External Threat Risk Assessment Algorithm (ExTRAA). Office of Scientific and Technical Information (OSTI), August 2017. http://dx.doi.org/10.2172/1379454.
Full textLiebhaber, M. J., and B. A. Feher. Surface Warfare Threat Assessment: Requirements Definition. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada406337.
Full textHolmberg, David G. BACnet wide area network security threat assessment. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.7009.
Full textLiebhaber, Michael J., and Bela Feher. Air Threat Assessment: Research, Model, and Display Guidelines. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada458047.
Full textDEPARTMENT OF DEFENSE WASHINGTON DC. Soviet Military Power: An Assessment of the Threat. Fort Belvoir, VA: Defense Technical Information Center, January 1988. http://dx.doi.org/10.21236/ada196828.
Full textCENTER FOR NAVAL ANALYSES ALEXANDRIA VA. The Post-Afghanistan IED Threat Assessment: Executive Summary. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada582113.
Full textAckerman, Gary. Radiological/Nuclear (RN) Terrorism: Global Assessment of Threat Intention Drivers. Office of Scientific and Technical Information (OSTI), November 2016. http://dx.doi.org/10.2172/1431197.
Full text