Dissertations / Theses on the topic 'Threat Assessment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Threat Assessment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.
Full textHolliday, Cyrus E. "Threat assessment in the new world order." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/30294.
Full textMitchell, Melanie. "No idle threat: Precursors to action in threateners with mental illness." Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/180839/1/Melanie_Mitchell_Thesis.pdf.
Full textEidehall, Andreas. "Tracking and threat assessment for automotive collision avoidance." Doctoral thesis, Linköping : Department of Electrical Engineering, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8338.
Full textBrown, Wade Robert. "A COMPARATIVE CASE STUDY ANALYSIS OF CAMPUS VIOLENCE PREVENTION PLANS AT THREE ILLINOIS HIGHER EDUCATION INSTITUTIONS." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/728.
Full textGaney, Harriss. "THE EFFECTS OF SECONDARY TASK DEMANDON THE ASSESSMENT OF THREAT." Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3722.
Full textPh.D.
Department of Psychology
Sciences
Psychology
Danielsson, Simon. "Monte Carlo based Threat Assessment: An in depth Analysis." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9480.
Full textThis thesis presents improvements and extensions of a previously presented threat assessment algorithm. The algorithm uses Monte Carlo simulation to find threats in a road scene. It is shown that, by using a wider sample distribution and only apply the most likely samples from the Monte Carlo simulation, for the threat assessment, improved results are obtained. By using this method more realistic paths will be chosen by the simulated vehicles and more complex traffic situations will be adequately handled.
An improvement of the dynamic model is also suggested, which improves the realism of the Monte Carlo simulations. Using the new dynamic model less false positive and more valid threats are detected.
A systematic method to choose parameters in a stochastic space, using optimisation, is suggested. More realistic trajectories can be chosen, by applying this method on the parameters that represents the human behaviour, in the threat assessment algorithm.
A new definition of obstacles in a road scene is suggested, dividing them into two groups, Hard and Soft obstacles. A change to the resampling step, in the Monte Carlo simulation, using the soft and hard obstacles is also suggested.
Mnjama, Javan Joshua. "Towards a threat assessment framework for consumer health wearables." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/62649.
Full textLe, Guillarme Nicolas. "A game-theoretic planning framework for intentional threat assessment." Caen, 2016. http://www.theses.fr/2016CAEN2046.
Full textIn this thesis, we address the problem of threat assessment, a high-level information fusion task whose main objective is to assist a decision maker in achieving a proper level of situation awareness so as to make effective and proactive decisions in possibly hostile, dynamic, and uncertain environments. Threat assessment is the problem of predicting intentional threat events and therefore it can be seen as a specific aspect of the problems of adversarial intention recognition and behavior prediction. Threat assessment is needed in adversarial situations, where several agents are competing to achieve conflicting goals in a shared environment. Adversarial situations can be modeled and analyzed using game theory which provides a formal framework for studying strategic interactions between rational decision makers. The main contribution of this thesis consists of a generative framework for threat assessment and decision support called TARGET (Threat Assessment and Response using GamE-Theory) which combines a game-theoretic model of adversarial behavior and an inverse-planning-based approach to adversarial intention recognition. Adversarial intention recognition is characterized by the hostility of the observed agent to the recognition process. To address this issue, we propose a set of techniques that make our system robust to deception and concealment
Sethi, Amita. "Potential denial of service threat assessment for cognitive radios." Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1453572.
Full textNusinov, Michael Cooper. "Visualizing threat and impact assessment to improve situation awareness /." Online version of thesis, 2009. http://hdl.handle.net/1850/11245.
Full textBatson, Louis T. V., and Donald R. Jr Wimmer. "Unmanned Tactical Autonomous Control and Collaboration threat and vulnerability assessment." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45738.
Full textInformation systems designed and developed without considering security and potential threats create avoidable risks to the United States and the Department of Defense (DOD). Unmanned Tactical Autonomous Control and Collaboration (UTACC) is a ground-breaking and original approach to using systems autonomy to augment and improve the intelligence, surveillance, and reconnaissance process. However, UTACC will fail to accomplish that task if the system is not built with security in mind from the outset. To improve the security of UTACC, this thesis conducts an analysis to identify threats and vulnerabilities in the system’s concept. The goal of this analysis was to mitigate threats and enable mission success to UTACC-supported missions. During the initial research, a framework for threat and vulnerability analysis was developed based on The National Institute of Standards and Technology’s (NIST) Risk Management Framework (RMF) and DOD’s Information Assurance Certification and Accreditation Process (DIACAP). This framework was used to create a threat template to analyze each threat facing UTACC and UTACC’s inherent vulnerabilities. The templates also include technical and non-technical security control strategies to mitigate each of the vulnerabilities within UTACC.
Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.
Full textFragkos, Grigorios. "Near real-time threat assessment using intrusion detection system's data." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html.
Full textPritchett, Beverly A. "Qualia a prescription for developing a quality health threat assessment /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FPritchett.pdf.
Full textThesis Advisor(s): Simeral, Robert ; Bergin, Richard. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 95-103). Also available in print.
Durtschi, Michael S. "The North Korean Special Purpose Forces an assessment of the threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA297448.
Full textAoudé, Georges Salim. "Threat assessment for safe navigation in environments with uncertainty in predictability." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68401.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 213-224).
This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is in the predictability of the nearby vehicles' future trajectories. The first part of the thesis introduces two classes of algorithms to classify drivers behaviors at roads intersections based on Support Vector Machines (SVM) and Hidden Markov Models (HMM). These algorithms are successfully validated using a large real-world intersection dataset, and can be used as part of future driver assistance systems. They are also compared to three popular traditional methods, and the results show significant and consistent improvements with the developed algorithms. The second part of the thesis presents an efficient trajectory prediction algorithm that has been developed to improve the performance of future collision avoidance and detection systems. The proposed approach, RR-GP, combines the Rapidly-exploring Random Trees (RRT) based algorithm, RRT-Reach, with mixtures of Gaussian Processes (GP) to compute dynamically feasible paths, in real-time, while embedding the flexibility of GP's nonparametric Bayesian model. RR-GP efficiently approximates the reachability sets of surrounding vehicles, and is shown in simulation and on naturalistic data to improve the performance over two standard GP-based algorithms. The third part introduces new path planning algorithms that build upon the tools that have been previously introduced in this thesis. The focus is on safe autonomous navigation in the presence of other vehicles with uncertain motion patterns. First, it presents a new threat assessment module (TAM) that combines the RRT-Reach algorithm with an SVM-based intention predictor, to develop a threat-aware path planner. The strengths of this approach are demonstrated through simulation and experiments performed in the MIT RAVEN testbed. Second, another novel path planning technique is developed by integrating the RR-GP trajectory prediction algorithm with a state-of-the-art chance-constrained RRT planner. This framework provides several theoretical guarantees on the probabilistic satisfaction of collision avoidance constraints. Extensive simulation results show that the resulting approach can be used in real-time to efficiently and accurately execute safe paths. The last part of the thesis considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. The proposed approach uses the TAM framework to compute the threat level in real-time, and provides the driver with a warning signal and the best escape maneuver through the intersection. Experimental results with small autonomous and human-driven vehicles in the RAVEN testbed demonstrate that this approach can be successfully used in real-time to minimize the risk of collision in urban-like environments.
by Georges Salim Aoudé.
Ph.D.
Doerzaph, Zachary R. "Development of a Threat Assessment Algorithm for Intersection Collision Avoidance Systems." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30013.
Full textPh. D.
Cao, Yanyan. "An epidemiological analysis of a university threat assessment team case load." Thesis, University of Iowa, 2011. https://ir.uiowa.edu/etd/1206.
Full textKhattar, Vanshaj. "Threat Assessment and Proactive Decision-Making for Crash Avoidance in Autonomous Vehicles." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103470.
Full textMaster of Science
Unexpected road situations frequently arise on the roads which leads to crashes. In an NHTSA study, it was reported that around 94% of car crashes could be attributed to driver errors and misjudgments. This could be attributed to drinking and driving, fatigue, or reckless driving on the roads. Full self-driving cars can significantly reduce the frequency of such accidents. Testing of self-driving cars has recently begun on certain roads, and it is estimated that one in ten cars will be self-driving by the year 2030. This means that these self-driving cars will need to operate in human-driven environments and interact with human-driven vehicles. Therefore, it is crucial for autonomous vehicles to understand the way humans drive on the road to avoid collisions and interact safely with human-driven vehicles on the road. Detecting a threat in advance and generating a safe trajectory for crash avoidance are some of the major challenges faced by autonomous vehicles. We have proposed a reliable decision-making algorithm for crash avoidance in autonomous vehicles. Our framework addresses two core challenges encountered in crash avoidance decision-making in autonomous vehicles: 1. The outside challenge: Reliable motion prediction of surrounding vehicles to continuously assess the threat to the autonomous vehicle. 2. The inside challenge: Generating a safe trajectory for the autonomous vehicle in case of future predicted threat. The outside challenge is to predict the motion of surrounding vehicles. This requires building a reliable model through which future evolution of their position states can be predicted. Building these models is not trivial, as the surrounding vehicles' motion depends on human driver intentions and behaviors, which are highly uncertain. Various driver behavior predictive models have been proposed in the literature. However, most do not quantify trust in their predictions. We have proposed a trust-based driver behavior prediction method which combines all sensor measurements to output the probability (trust value) of a certain driver being "drowsy", "aggressive", or "normal". This method allows the autonomous vehicle to choose how much to trust a particular prediction. Once a picture is painted of surrounding vehicles, we can generate safe trajectories in advance – the inside challenge. Most existing approaches use stochastic optimal control methods, which are computationally expensive and impractical for fast real-time decision-making in crash scenarios. We have proposed a fast, proactive decision-making algorithm to generate crash avoidance trajectories based on Stochastic Model Predictive Control (SMPC). We reformulate the SMPC probabilistic constraints as deterministic constraints using convex hull formulation, allowing for faster real-time implementation. This deterministic SMPC implementation ensures in real-time that the vehicle maintains a minimum probabilistic safety.
Pappaterra, Mauro José. "Implementing Bayesian Networks for online threat detection." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-86238.
Full textToppe, Michele L. "Creating Safer Campuses through Implementation of Threat-Assessment Teams| Are They Enough?" Thesis, University of Pennsylvania, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10281353.
Full textAccording to higher education policy experts, “Campus threat assessment is not merely a recommendation, but an emerging standard of care.” However, despite evidence of the emergence of this standard and the consistency of recommendations that comport with those made by the Virginia Tech Review Panel, college campuses continue to vary significantly in their approaches to threat-assessment protocols. This study examines the extent to which campuses in the state of Illinois do vary and seeks to understand better the reasons for that variation. This research also examines the status of threat-assessment policies and protocols being conducted on three campuses and how the implementation of recommendations that followed Virginia Tech and Northern Illinois shootings have contributed to the creation of more optimally safe campuses. The study also examines the prevalence and consistency of the barriers that impede institutional efforts to detect and mitigate campus threats of violence.
Research sites included Northern Illinois University, where an incident of violence occurred in 2008, and the University of Illinois–Chicago and Illinois State University, where an incident of such magnitude has not yet occurred. The findings suggest that in states where the implementation of threat-assessment protocols and policies has been mandated by state law, campus leaders perceive these required measures to increase the preparedness of the campus environment. The research also suggests that even in Illinois, a state where such policy schemes are mandated, variation in the application of these policies and protocols persists. Findings suggest that even in states where policies are legislatively mandated, campuses continue to experience barriers to full implementation of recommendations that might lead to greater preparedness, including ambiguity regarding how best to balance the obligation to protect individual privacy and community security and to address self-harming behaviors and suicidality, the limited utility in zero-tolerance standards, institutional constraints in policy adoption and participation by the campus community, and insufficient dedication of institutional funding and support. The most significant barrier, however, was the unrealistic expectation that campus personnel be able to predict future behavior and events.
Williams, David E. "Iran's nuclear program an assessment of the threat to the United States." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4323.
Full textThis thesis explores the threat, if any, posed to the United States by the Iranian nuclear program. Specifically, it addresses whether Iran's pursuit of nuclear technology is likely to represent a threat for homeland defense (direct use of nuclear weapons) or homeland security (indirect use of nuclear weapons through intermediaries). It begins with an overview of the cooperation and conflict between the U.S. and Iran on a number of issues, but primarily in regard to nuclear technology. Next, it addresses Iranian intentions, motivations, and rationality for developing nuclear technology. The possible employment options for Iranian nuclear weapons are then reviewed and assessed in terms of their likelihood based on historical models of deterrence derived from the U.S.-Soviet relationship during the Cold War (direct use), as well as theoretical models of Pakistan's development of nuclear weapons (indirect use). It appears that Iran's pursuit of nuclear technology results from a combination of security concerns, pride, prestige, and a desire for regional leadership. Iran has rational motivations for pursuing nuclear technology; therefore, U.S. leaders should approach Iran as a rational actor in order to avert further conflict between the two states.
Williams, David E. "Iran's nuclear program as assessment of the threat to the United States /." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FWilliams.pdf.
Full textThesis Advisor(s): Hafez, Mohammed ; Kadhim, Abbas. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Iran, Nuclear weapons, Deterrence, Homeland defense, Homeland security. Includes bibliographical references (p. 81-90). Also available in print.
Miehling, Erik J. "Stochastic target scheduling for radar resource management : threat assessment and optimal threshold policies." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/37417.
Full textLeggett, Ted. "Transnational trafficking and the rule of law in West Africa : a threat assessment /." Vienna : UNODC, 2009. http://viewer.zmags.com/publication/d86db66e.
Full textMkerenga, Elizabeth Neema. "An Assessment of the threat of Right-Wing Populism in the European Parliament." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85991.
Full textOzkan, Baris Egemen. "Autonomous agent-based simulation of a model simulating the human air-threat assessment process." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOzkan.pdf.
Full textMattson-Hansen, Kimberly M. "Modeling Ecological Risks at a Landscape Scale: Threat Assessment in the Upper Tennessee River Basin." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78611.
Full textPh. D.
Anderson, Sterling J. Ph D. Massachusetts Institute of Technology. "A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/49876.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 111-117).
This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation task is formulated as a constrained optimal control problem with the constraints bounding a navigable region of the environment derived from forward -looking sensors. First, a constrained model predictive controller is designed to iteratively plan an optimal or "best-case" vehicle trajectory through the constrained corridor. This "best-case" scenario is then used to establish the minimum threat posed to the vehicle given its current state and driver inputs. Based on this threat assessment, the level of controller intervention required to prevent departure from the navigable corridor is calculated and driver/controller inputs are scaled accordingly. This approach minimizes controller intervention while ensuring that the vehicle does not depart from a navigable corridor. It also provides a unified architecture into which various vehicle models, actuation modes, trajectory-planning objectives, driver preferences, and levels of autonomy can be seamlessly integrated without changing the underlying controller structure. Simulated and experimental results are presented to demonstrate the framework's ability to incorporate multiple threat metrics and configurable intervention laws while sharing control with a human driver. Various maneuvers are tested, including lane-keeping, hazard avoidance, and multiple hazard avoidance and show that this framework capable of maintaining vehicle stability while semi-autonomously avoiding road hazards and conceding significant control to the human driver.
by Sterling J. Anderson.
S.M.
Papadopoulos, Nikolaos. "How Secure are you Online? : A Cybersecurity Assessment of the Recommendations Provided to Swedish Citizens." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104921.
Full textPhillips, Richard Hyland. "The evolution of Soviet military and civilian threat assessment in the Gorbachev era : fragmentation and competition." Thesis, Massachusetts Institute of Technology, 1991. https://hdl.handle.net/1721.1/126351.
Full textIncludes bibliographical references (leaves 276-334).
by Richard Hyland Phillips.
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 1991.
Powar, Nilesh U. "An Approach for the Extraction of Thermal Facial Signatures for Evaluating Threat and Challenge Emotional States." University of Dayton / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1386697359.
Full textKolbeinsson, Ari. "Visualising uncertainty in aircraft cockpits : Is icon degradation an appropriate visualisation form." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-8342.
Full textBakare, Adeyinka A. "A Methodology for Cyberthreat ranking: Incorporating the NIST Cybersecurity Framework into FAIR Model." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1583247043269043.
Full textKeith, Mark. "Conservation assessment of South African mammals." Thesis, Connect to this title online, 2005. http://upetd.up.ac.za/thesis/available/etd-02142006-162024/.
Full textBernhardt, Wilhelm. "A qualitative conceptual framework for conducting risk- and threat assessment in the South African domestic intelligence environment." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-05052005-162339/.
Full textAyhan, Murat. "A Model-based Guidance And Vulnerability Assessment Approach For Facilities Under The Threat Of Multi-hazard Emergencies." Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614534/index.pdf.
Full textDunn, John Glen Hunter. "Measurement and conceptual issues regarding the assessment of situational threat and competitive trait anxiety in ice hockey." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0007/NQ29031.pdf.
Full textConstantin, Alexandre S. M. Massachusetts Institute of Technology. "A margin-based approach to vehicle threat assessment in a homotopy framework for semi-autonomous highway navigation." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/92146.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 139-145).
This thesis describes the design of an unified framework for threat assessment and the shared control between a human driver and the onboard controller, based on the notion of fields of safe travel. It allows to perform corridor navigation, trajectory planning, threat assessment and driving assistance in hazardous situations. A new approach to the threat assessment problem is introduced, based upon the estimation of the control freedom afforded to a vehicle. Given sensor information of the surrounding environment, an algorithm first identifies corridors of travel through which the vehicle can safely navigate. The second stage then consists in assessing the potential threat posed to the vehicle in each identified corridor thanks to a metric associated with available control margin. For this purpose, the fields of safe travel are associated with sets of homotopic trajectories generated either from a lattice sampled in the vehicles input space or from a conformal state lattice. This level of threat is the keystone of the system and serves as input to influence autonomous navigation or driver support inputs. The semi-autonomous control system aims to honor safe driver inputs while ensuring safe and robust navigation properties. It ideally operates only during instances of significant threat: it should give a driver full control of the vehicle in "low threat" situations but apply appropriate levels of computer-controlled actuator effort during "high threat" situations. This approach preserves the freedom of control of the human driver when he/she remains within a safe navigable corridor, and adjust the vehicle trajectory when its predicted future state falls out of a safe field, or when the lowest threat exceeds some threshold. In fully autonomous mode, this human-inspired motion planning approach ensures collision free navigation and driving comfort.
by Alexandre Constantin.
S.M.
Njoroge, Lydia. "From Property to Person: Understanding the Mediating Role of Control on Ovulation in the Female Consumer Experience." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538790/.
Full textHe, Xiaobing [Verfasser], Hermann de [Akademischer Betreuer] Meer, and Stefan [Akademischer Betreuer] Rass. "Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks / Xiaobing He ; Hermann de Meer, Stefan Rass." Passau : Universität Passau, 2017. http://d-nb.info/114461144X/34.
Full textHendrick, Lindsey R. F. "Climate Change and Mountaintop Removal Mining: A MaxEnt Assessment of the Potential Dual Threat to West Virginia Fishes." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5291.
Full textNorén, Viveca. "When water becomes a threat : Risk assessment and risk management plans for floods and drinking water in Swedish practice." Doctoral thesis, Uppsala universitet, Luft-, vatten och landskapslära, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-301940.
Full textVatten är en livsnödvändig men sårbar resurs. Brist på dricksvatten av god kvalitet är ett allvarligt hot mot människors hälsa och för hela samhället. Även överflöd av vatten i form av översvämningar kan vara ett allvarligt hot och kan bland annat får konsekvenser för dricksvattenförsörjningen. För att minska dessa risker finns det behov av systematiskt riskreducerande arbete. De senaste decennierna har systematisk riskhantering (risk management approach) utvecklats inom hanteringen av översvämningar och dricksvattenförsörjning. Detta innebär att en reaktiv och osystematisk hantering ersätts med en mer proaktiv och systematisk hantering baserad på analys och utvärdering av risker som stöd för beslutsfattande. Den komplexitet som vattenfrågor omfattar har också gjort det tydligt att det finns behov av en helhetsyn på hur vatten hanteras och att ett flertal aktörer och sektorer behöver involveras. Teorier om integrerad hantering (integrated management) har vuxit fram och börjat implementeras. Syftet med denna avhandling är att undersöka hur riskhantering, särskilt riskbedömningar, på lokal nivå utförs eller kan utföras i praktiken i Sverige. Praktiken har beskrivits och karakteriserats i förhållande till befintliga ramverk om riskhantering. Dessutom är syftet att undersöka hur konsekvenser av översvämningar på dricksvattenförsörjningen behandlas i metoder för riskbedömning och riskhanteringsplaner för översvämning liksom att studera om risker relaterade till översvämningar och dricksvatten har behandlats på ett integrerat sätt. Studierna är baserad på intervjuer med översvämningshanterare i svenska kommuner och svenska vattenproducenter samt dokumentstudier av metoder för riskbedömning och riskhanteringsplaner för översvämning. Det är stora skillnader mellan hur och i vilken omfattning olika kommuner och vattenproducenter har gjort riskbedömningar. Vissa har knappt gjort någon riskbedömning alls medan andra har arbetat mer systematiskt. De verktyg som används är ofta de som finns i handböcker från svenska myndigheter och är ofta mindre avancerade än vad som beskrivs i litteraturen. Riskbedömningarna täcker inte alltid all relevanta aspekter av risken och det är få som har diskuterat vad som är en acceptabel risknivå. Översvämningsbedömningarna har fokuserat på vilka objekt som exponeras vid en översvämning och möjliga konsekvenser på drabbade objekt har undersökts i mycket begränsad utsträckning. Ofullständiga riskbedömningar kan ge en felaktig bild av risken och därmed vara ett inkomplett underlag för beslutsfattande. Den teoretiska kunskapen om riskhantering är i många fall låg och många har en praktisk inställning till riskhanteringen. Det saknas oftast strategi och helhetstänkande. Kunskapen om konsekvenser av översvämning på dricksvattenförsörjningen är begränsad och behandlas inte heller i detalj i de metoder för riskbedömning som är mest vanligt förekommande i Sverige. Det finns en medvetenhet om behovet av att koordinera hanteringen av översvämning och vattenresurser. Trots de goda intentionerna om integrering visar riskbedömningar och riskhanteringsplaner få tecken på att integrering sker i praktiken. Både systematisk riskhantering och integrerad hantering är synsätt som har börjat utvecklas och implementeras inom svensk hantering av översvämningar och dricksvattenförsörjning. Det sker dock fortfarande på en relativt grundläggande nivå och det är en lång väg kvar. Det finns behov av ytterligare vägledning och mer kunskap om riskhantering liksom engagemang från och samarbete mellan alla berörda aktörer för att stödja vidare utveckling.
Radholm, Fredrik, and Niklas Abefelt. "Ethical Hacking of an IoT-device: Threat Assessment and Penetration Testing : A Survey on Security of a Smart Refrigerator." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280295.
Full textInternet of Things (IoT) enheter blir mer allmänt förekommande. På grund av en snabbt expanderande marknad av dessa apparater, har bristfälliga säkerhetsåtgärder resulterat till en mängd olika attacker. Det finns ett behov att testa dessa enheter for att bidra till ett mer säkert och hållbart samhälle. Denna avhandling har utvärderat säkerheten av ett IoT-kylskåp genom att producera en hot modell för att identifiera sårbarheter. Penetrationstester har utförts på enheten, baserade på hot modellen. Resultatet av penetrationstesterna hittade inga utnyttjningsbara sårbarheter. Slutsatsen från utvärderingen av säkerheten på Samsung-kylskåpet är att produkten är säker och bidrar till ett uppkopplat, säkert, och hållbart samhälle.
Edmed, Shannon L. "The influence of psychosocial factors on expectations and persistent symptom report after mild traumatic brain injury." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/78670/6/Shannon_Edmed_Thesis.pdf.
Full textMunir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.
Full textHaller, Vanessa. "Ecological models for threat management: Considering the unknowns using numerical analysis and machine learning." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/210467/1/Vanessa_Haller_Thesis.pdf.
Full textOlson, Dean T. "The path to terrorist violence : a threat assessment model for radical groups at risk of escalation to acts of terrorism." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FOlson.pdf.
Full textThesis Advisor(s): David Tucker. Includes bibliographical references (p. 59-65). Also available online.
Wei, Christina C. "The Role of Response Expectancies in Neuropsychological Performance in Young Adults Concerned about Attention-Deficit/Hyperactivity Disorder." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1367333253.
Full text