To see the other types of publications on this topic, follow the link: Threat Assessment.

Dissertations / Theses on the topic 'Threat Assessment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Threat Assessment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holliday, Cyrus E. "Threat assessment in the new world order." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/30294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mitchell, Melanie. "No idle threat: Precursors to action in threateners with mental illness." Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/180839/1/Melanie_Mitchell_Thesis.pdf.

Full text
Abstract:
This thesis examined threats of violence made by persons with mental illness and in particular, who acts on violent threats and who does not. Threats were common occurrences and 55% per cent of threateners went on to be violent. Several predictors of violence were identified, including younger age, intellectual impairment and active mood and/or psychotic symptoms. Methods for preventing, identifying and managing threat-related violence were explored. This research has practical implications for those working in mental health settings and those supporting people who have a mental illness and make threats of violence.
APA, Harvard, Vancouver, ISO, and other styles
4

Eidehall, Andreas. "Tracking and threat assessment for automotive collision avoidance." Doctoral thesis, Linköping : Department of Electrical Engineering, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Wade Robert. "A COMPARATIVE CASE STUDY ANALYSIS OF CAMPUS VIOLENCE PREVENTION PLANS AT THREE ILLINOIS HIGHER EDUCATION INSTITUTIONS." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/728.

Full text
Abstract:
The postsecondary acts of violence at Virginia Technical University (VT) and Northern Illinois University (NIU) forced Illinois legislators to approve the Campus Security Enhancement Act in 2008 (110 ILCS 12/20). The Act requires all private and public postsecondary education institutions to develop a Campus Violence Prevention Plan (CVPP), as well as two multi-disciplinary groups to implement the plan and address behaviors of concern, a Campus Violence Prevention Committee (CVPC) and Threat Assessment Team (TAT) (CESA, 2008). Recent research has uncovered that several institutions within the state have not completed their CVPP and the Act has left some institutions unsure of which agency to report to and how to effectively develop and implement their CVPP (Gregory, 2012; Pawlowski & Manetti, 2011). This research study is the first investigation into the groundbreaking Illinois legislation. Utilizing a case study design, the purpose of the research study is to explore how three Illinois postsecondary institutions of similar Carnegie classifications created, implemented, assessed, and addressed challenges in developing their CVPP's. One-on-one interviews and document analysis were used to gather data. With-in case analysis and cross-case analysis were performed to generated research themes to answer the research questions. Four cross-case analysis themes were created to answer the corresponding research questions. Conclusions from this study may assist other Illinois postsecondary institutions in developing their CVPP's and decrease the likelihood of violence occurring in the postsecondary environment.
APA, Harvard, Vancouver, ISO, and other styles
6

Ganey, Harriss. "THE EFFECTS OF SECONDARY TASK DEMANDON THE ASSESSMENT OF THREAT." Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3722.

Full text
Abstract:
Threat perception is an important issue in today's world. As the line between hostile and non-hostile entities is blurred, it becomes more important for individuals to clearly distinguish between those who would present danger and those who would not. This series of experiments tested whether observers engaged in a dual-task paradigm perceived a greater amount of threat from target stimuli than they did when they were engaged in the threat task alone. The first experiment revealed that observers rated targets as more threatening when they were engaged in the additional task than when they only rated the targets themselves. Response time to the targets was also slower when a secondary task was present. This difference was more pronounced when the secondary task was presented via the auditory channel. Participants also rated overall workload higher when performing a secondary task, with the highest ratings being associated with the dual-task auditory condition. In the second experiment, the design crossed sensory modality with the presence or non-presence of threat. Inter-stimulus interval was also manipulated. The presence of threat was associated with faster response times, though when both tasks had threat components, response time was not the fastest. Additionally, when images came first in the stimulus pairs, observers were slower to respond to the first stimulus than when the sounds were presented first. Results supported the conclusion that additional task loading can affect the perception of threat. The modality of the additional task seems to also play a role in threat assessment performance. Results also led to the conclusion that threat-related visual stimuli are more challenging to process than threat-related auditory stimuli. Future research can now investigate how different types of tasks affect the threat perception task. Implications for better training of soldiers and for the design of automated systems are presented.
Ph.D.
Department of Psychology
Sciences
Psychology
APA, Harvard, Vancouver, ISO, and other styles
7

Danielsson, Simon. "Monte Carlo based Threat Assessment: An in depth Analysis." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9480.

Full text
Abstract:

This thesis presents improvements and extensions of a previously presented threat assessment algorithm. The algorithm uses Monte Carlo simulation to find threats in a road scene. It is shown that, by using a wider sample distribution and only apply the most likely samples from the Monte Carlo simulation, for the threat assessment, improved results are obtained. By using this method more realistic paths will be chosen by the simulated vehicles and more complex traffic situations will be adequately handled.

An improvement of the dynamic model is also suggested, which improves the realism of the Monte Carlo simulations. Using the new dynamic model less false positive and more valid threats are detected.

A systematic method to choose parameters in a stochastic space, using optimisation, is suggested. More realistic trajectories can be chosen, by applying this method on the parameters that represents the human behaviour, in the threat assessment algorithm.

A new definition of obstacles in a road scene is suggested, dividing them into two groups, Hard and Soft obstacles. A change to the resampling step, in the Monte Carlo simulation, using the soft and hard obstacles is also suggested.

APA, Harvard, Vancouver, ISO, and other styles
8

Mnjama, Javan Joshua. "Towards a threat assessment framework for consumer health wearables." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/62649.

Full text
Abstract:
The collection of health data such as physical activity, consumption and physiological data through the use of consumer health wearables via fitness trackers are very beneficial for the promotion of physical wellness. However, consumer health wearables and their associated applications are known to have privacy and security concerns that can potentially make the collected personal health data vulnerable to hackers. These concerns are attributed to security theoretical frameworks not sufficiently addressing the entirety of privacy and security concerns relating to the diverse technological ecosystem of consumer health wearables. The objective of this research was therefore to develop a threat assessment framework that can be used to guide the detection of vulnerabilities which affect consumer health wearables and their associated applications. To meet this objective, the Design Science Research methodology was used to develop the desired artefact (Consumer Health Wearable Threat Assessment Framework). The framework is comprised of fourteen vulnerabilities classified according to Authentication, Authorization, Availability, Confidentiality, Non-Repudiation and Integrity. Through developing the artefact, the threat assessment framework was demonstrated on two fitness trackers and their associated applications. It was discovered, that the framework was able to identify how these vulnerabilities affected, these two test cases based on the classification categories of the framework. The framework was also evaluated by four security experts who assessed the quality, utility and efficacy of the framework. Experts, supported the use of the framework as a relevant and comprehensive framework to guide the detection of vulnerabilities towards consumer health wearables and their associated applications. The implication of this research study is that the framework can be used by developers to better identify the vulnerabilities of consumer health wearables and their associated applications. This will assist in creating a more securer environment for the storage and use of health data by consumer health wearables.
APA, Harvard, Vancouver, ISO, and other styles
9

Le, Guillarme Nicolas. "A game-theoretic planning framework for intentional threat assessment." Caen, 2016. http://www.theses.fr/2016CAEN2046.

Full text
Abstract:
Dans cette thèse, nous considérons le problème de l’évaluation de la menace, une tâche de fusion d’informations de haut niveau dont l'objectif principal est d’assister un décideur dans l'acquisition d'un niveau de conscience de la situation suffisamment élevé pour prendre des décisions appropriées dans un environnement potentiellement hostile, dynamique et incertain. L'évaluation de la menace consiste à prédire l'occurrence d’événements néfastes intentionnels et peut donc être vue comme un cas particulier des problèmes de reconnaissance de l’intention et de prédiction du comportement. L'évaluation de la menace trouve son utilité dans des situations antagonistes, où plusieurs agents tentent d’atteindre des objectifs incompatibles dans un environnement partagé. De telles situations peuvent être modélisées et analysées à l'aide d'outils de la théorie des jeux qui propose un cadre formel pour l’étude des interactions stratégiques entre décideurs rationnels. La principale contribution de cette thèse consiste en un cadre génératif pour l’évaluation de la menace et l'aide à la décision baptisé TARGET (Threat Assessment and Response using GamE-Theory) qui combine une modélisation du comportement d’un agent hostile basée sur la théorie des jeux stochastiques et une méthode de reconnaissance d’intention d'un adversaire par planification inverse. Le problème de reconnaissance d'intention d’un adversaire étant caractérisé par l'hostilité de l'agent observé vis à vis du processus de reconnaissance, nous proposons un ensemble de techniques permettant de rendre notre système robuste à la tromperie et à la dissimulation
In this thesis, we address the problem of threat assessment, a high-level information fusion task whose main objective is to assist a decision maker in achieving a proper level of situation awareness so as to make effective and proactive decisions in possibly hostile, dynamic, and uncertain environments. Threat assessment is the problem of predicting intentional threat events and therefore it can be seen as a specific aspect of the problems of adversarial intention recognition and behavior prediction. Threat assessment is needed in adversarial situations, where several agents are competing to achieve conflicting goals in a shared environment. Adversarial situations can be modeled and analyzed using game theory which provides a formal framework for studying strategic interactions between rational decision makers. The main contribution of this thesis consists of a generative framework for threat assessment and decision support called TARGET (Threat Assessment and Response using GamE-Theory) which combines a game-theoretic model of adversarial behavior and an inverse-planning-based approach to adversarial intention recognition. Adversarial intention recognition is characterized by the hostility of the observed agent to the recognition process. To address this issue, we propose a set of techniques that make our system robust to deception and concealment
APA, Harvard, Vancouver, ISO, and other styles
10

Sethi, Amita. "Potential denial of service threat assessment for cognitive radios." Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1453572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Nusinov, Michael Cooper. "Visualizing threat and impact assessment to improve situation awareness /." Online version of thesis, 2009. http://hdl.handle.net/1850/11245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Batson, Louis T. V., and Donald R. Jr Wimmer. "Unmanned Tactical Autonomous Control and Collaboration threat and vulnerability assessment." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45738.

Full text
Abstract:
Approved for public release; distribution is unlimited
Information systems designed and developed without considering security and potential threats create avoidable risks to the United States and the Department of Defense (DOD). Unmanned Tactical Autonomous Control and Collaboration (UTACC) is a ground-breaking and original approach to using systems autonomy to augment and improve the intelligence, surveillance, and reconnaissance process. However, UTACC will fail to accomplish that task if the system is not built with security in mind from the outset. To improve the security of UTACC, this thesis conducts an analysis to identify threats and vulnerabilities in the system’s concept. The goal of this analysis was to mitigate threats and enable mission success to UTACC-supported missions. During the initial research, a framework for threat and vulnerability analysis was developed based on The National Institute of Standards and Technology’s (NIST) Risk Management Framework (RMF) and DOD’s Information Assurance Certification and Accreditation Process (DIACAP). This framework was used to create a threat template to analyze each threat facing UTACC and UTACC’s inherent vulnerabilities. The templates also include technical and non-technical security control strategies to mitigate each of the vulnerabilities within UTACC.
APA, Harvard, Vancouver, ISO, and other styles
13

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Full text
Abstract:
A malicious actor often relies on security vulnerabilities of IT systems to launch a cyber attack. Most cloud services are supported by an orchestration of large and complex systems which are prone to vulnerabilities, making threat assessment very challenging. In this research, I developed formal and practical ontology-based techniques that enable automated evaluation of a cloud system's security threats. I use an architecture for threat assessment of cloud systems that leverages a dynamically generated ontology knowledge base. I created an ontology model and represented the components of a cloud system. These ontologies are designed for a set of domains that covers some cloud's aspects and information technology products' cyber threat data. The inputs to our architecture are the configurations of cloud assets and components specification (which encompass the desired assessment procedures) and the outputs are actionable threat assessment results. The focus of this work is on ways of enumerating, assessing, and mitigating emerging cyber security threats. A research toolkit system has been developed to evaluate our architecture. We expect our techniques to be leveraged by any cloud provider or consumer in closing the gap of identifying and remediating known or impending security threats facing their cloud's assets.
APA, Harvard, Vancouver, ISO, and other styles
14

Fragkos, Grigorios. "Near real-time threat assessment using intrusion detection system's data." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html.

Full text
Abstract:
The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent computer networks, the use of different types of Intrusion Detection Systems (IDS) is considered essential and in most cases mandatory. Major improvements have been achieved over the years and a large number of different approaches have been developed and applied in the way these systems perform Intrusion Detection. The purpose of the research is to introduce a novel approach that will enable us to take advantage of the vast amounts of information generated by the large number of different IDSs, in order to identify suspicious traffic, malicious intentions and network attacks in an automated manner. In order to achieve this, the research focuses upon a system capable of identifying malicious activity in near real-time, that is capable of identifying attacks while they are progressing. The thesis addresses the near real-time threat assessment by researching into current state of the art solutions. Based on the literature review, current Intrusion Detection technologies lean towards event correlation systems using different types of detections techniques. Instead of using linear event signatures or rule sets, the thesis suggests a structured description of network attacks based on the abstracted form of the attacker’s activity. For that reason, the design focuses upon the description of network attacks using the development of footprints. Despite the level of knowledge, capabilities and resources of the attacker, the system compares occurring network events against predefined footprints in order to identify potential malicious activity. Furthermore, based on the implementation of the footprints, the research also focuses upon the design of the Threat Assessment Engine (TAE) which is capable of performing detection in near real-time by the use of the above described footprints. The outcome of the research proves that it is possible to have an automated process performing threat assessment despite the number of different ongoing attacks taking place simultaneously. The threat assessment process, taking into consideration the system’s architecture, is capable of acting as the human analyst would do when investigating such network activity. This automation speeds up the time-consuming process of manually analysing and comparing data logs deriving from heterogeneous sources, as it performs the task in near real-time. Effectively, by performing the this task in near real-time, the proposed system is capable of detecting complicated malicious activity which in other cases, as currently performed, it would be difficult, maybe impossible or results would be generated too late.
APA, Harvard, Vancouver, ISO, and other styles
15

Pritchett, Beverly A. "Qualia a prescription for developing a quality health threat assessment /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FPritchett.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Simeral, Robert ; Bergin, Richard. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 95-103). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
16

Durtschi, Michael S. "The North Korean Special Purpose Forces an assessment of the threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA297448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Aoudé, Georges Salim. "Threat assessment for safe navigation in environments with uncertainty in predictability." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68401.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 213-224).
This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is in the predictability of the nearby vehicles' future trajectories. The first part of the thesis introduces two classes of algorithms to classify drivers behaviors at roads intersections based on Support Vector Machines (SVM) and Hidden Markov Models (HMM). These algorithms are successfully validated using a large real-world intersection dataset, and can be used as part of future driver assistance systems. They are also compared to three popular traditional methods, and the results show significant and consistent improvements with the developed algorithms. The second part of the thesis presents an efficient trajectory prediction algorithm that has been developed to improve the performance of future collision avoidance and detection systems. The proposed approach, RR-GP, combines the Rapidly-exploring Random Trees (RRT) based algorithm, RRT-Reach, with mixtures of Gaussian Processes (GP) to compute dynamically feasible paths, in real-time, while embedding the flexibility of GP's nonparametric Bayesian model. RR-GP efficiently approximates the reachability sets of surrounding vehicles, and is shown in simulation and on naturalistic data to improve the performance over two standard GP-based algorithms. The third part introduces new path planning algorithms that build upon the tools that have been previously introduced in this thesis. The focus is on safe autonomous navigation in the presence of other vehicles with uncertain motion patterns. First, it presents a new threat assessment module (TAM) that combines the RRT-Reach algorithm with an SVM-based intention predictor, to develop a threat-aware path planner. The strengths of this approach are demonstrated through simulation and experiments performed in the MIT RAVEN testbed. Second, another novel path planning technique is developed by integrating the RR-GP trajectory prediction algorithm with a state-of-the-art chance-constrained RRT planner. This framework provides several theoretical guarantees on the probabilistic satisfaction of collision avoidance constraints. Extensive simulation results show that the resulting approach can be used in real-time to efficiently and accurately execute safe paths. The last part of the thesis considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. The proposed approach uses the TAM framework to compute the threat level in real-time, and provides the driver with a warning signal and the best escape maneuver through the intersection. Experimental results with small autonomous and human-driven vehicles in the RAVEN testbed demonstrate that this approach can be successfully used in real-time to minimize the risk of collision in urban-like environments.
by Georges Salim Aoudé.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
18

Doerzaph, Zachary R. "Development of a Threat Assessment Algorithm for Intersection Collision Avoidance Systems." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30013.

Full text
Abstract:
Relative to other roadway segments, intersections occupy a small portion of the overall infrastructure; however, they represent the location for nearly 41 % of the annual automotive crashes in the United States. Thus, intersections are an inherently dangerous roadway element and a prime location for vehicle conflicts. Traditional safety treatments are effective at addressing certain types of intersection safety deficiencies; however, cumulative traffic data suggests these treatments do not address a large portion of the crashes that occur each year. Intersection Collision Avoidance Systems (ICAS) represent a new breed of countermeasures that focus on the types of crashes that have not been reduced with the application of traditional methods. Incursion systems, a subset of ICAS, are designed to specifically undertake crashes that are a result of the violation of a traffic control device. Intersection Collision Avoidance Systems to address Violations (ICAS-V) monitor traffic as it approaches the intersection through a network of in-vehicle sensors, infrastructure- mounted sensors, and communication equipment. A threat-assessment algorithm performs computations to predict the driver's intended intersection maneuver, based on these sensor inputs. If the system predicts a violation, it delivers a timely warning to the driver with the aim of compelling the driver to stop. This warning helps the driver to avoid a potential crash with adjacent traffic. The following dissertation describes an investigation of intersection approach behavior aimed at developing a threat assessment algorithm for stop-sign intersections. Data were collected at live intersections to gather infrastructure-based naturalistic vehicle approach trajectories. This data were compiled and analyzed with the goal of understanding how drivers approach intersections under various speeds and environmental conditions. Six stop-controlled intersection approaches across five intersections in the New River Valley, Virginia area were selected as the test sites. Data were collected from each site for at least two months, resulting in over sixteen total months of data. A series of statistical analysis techniques were applied to construct a set of threat assessment algorithms for stop-controlled intersections. These analyses identified characteristics of intersection approaches that suggested driver intent at the stop sign. Models were constructed to predict driver stopping intent based on measured vehicle kinematics. These models were thoroughly tested using simulation and evaluated with signal detection theory. The overall output of this work is a set of algorithms that may be integrated into an ICAS-V for on-road testing.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
19

Cao, Yanyan. "An epidemiological analysis of a university threat assessment team case load." Thesis, University of Iowa, 2011. https://ir.uiowa.edu/etd/1206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Khattar, Vanshaj. "Threat Assessment and Proactive Decision-Making for Crash Avoidance in Autonomous Vehicles." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103470.

Full text
Abstract:
Threat assessment and reliable motion-prediction of surrounding vehicles are some of the major challenges encountered in autonomous vehicles' safe decision-making. Predicting a threat in advance can give an autonomous vehicle enough time to avoid crashes or near crash situations. Most vehicles on roads are human-driven, making it challenging to predict their intentions and movements due to inherent uncertainty in their behaviors. Moreover, different driver behaviors pose different kinds of threats. Various driver behavior predictive models have been proposed in the literature for motion prediction. However, these models cannot be trusted entirely due to the human drivers' highly uncertain nature. This thesis proposes a novel trust-based driver behavior prediction and stochastic reachable set threat assessment methodology for various dangerous situations on the road. This trust-based methodology allows autonomous vehicles to quantify the degree of trust in their predictions to generate the probabilistically safest trajectory. This approach can be instrumental in the near-crash scenarios where no collision-free trajectory exists. Three different driving behaviors are considered: Normal, Aggressive, and Drowsy. Hidden Markov Models are used for driver behavior prediction. A "trust" in the detected driver is established by combining four driving features: Longitudinal acceleration, lateral acceleration, lane deviation, and velocity. A stochastic reachable set-based approach is used to model these three different driving behaviors. Two measures of threat are proposed: Current Threat and Short Term Prediction Threat which quantify present and the future probability of a crash. The proposed threat assessment methodology resulted in a lower rate of false positives and negatives. This probabilistic threat assessment methodology is used to address the second challenge in autonomous vehicle safety: crash avoidance decision-making. This thesis presents a fast, proactive decision-making methodology based on Stochastic Model Predictive Control (SMPC). A proactive decision-making approach exploits the surrounding human-driven vehicles' intent to assess the future threat, which helps generate a safe trajectory in advance, unlike reactive decision-making approaches that do not account for the surrounding vehicles' future intent. The crash avoidance problem is formulated as a chance-constrained optimization problem to account for uncertainty in the surrounding vehicle's motion. These chance-constraints always ensure a minimum probabilistic safety of the autonomous vehicle by keeping the probability of crash below a predefined risk parameter. This thesis proposes a tractable and deterministic reformulation of these chance-constraints using convex hull formulation for a fast real-time implementation. The controller's performance is studied for different risk parameters used in the chance-constraint formulation. Simulation results show that the proposed control methodology can avoid crashes in most hazardous situations on the road.
Master of Science
Unexpected road situations frequently arise on the roads which leads to crashes. In an NHTSA study, it was reported that around 94% of car crashes could be attributed to driver errors and misjudgments. This could be attributed to drinking and driving, fatigue, or reckless driving on the roads. Full self-driving cars can significantly reduce the frequency of such accidents. Testing of self-driving cars has recently begun on certain roads, and it is estimated that one in ten cars will be self-driving by the year 2030. This means that these self-driving cars will need to operate in human-driven environments and interact with human-driven vehicles. Therefore, it is crucial for autonomous vehicles to understand the way humans drive on the road to avoid collisions and interact safely with human-driven vehicles on the road. Detecting a threat in advance and generating a safe trajectory for crash avoidance are some of the major challenges faced by autonomous vehicles. We have proposed a reliable decision-making algorithm for crash avoidance in autonomous vehicles. Our framework addresses two core challenges encountered in crash avoidance decision-making in autonomous vehicles: 1. The outside challenge: Reliable motion prediction of surrounding vehicles to continuously assess the threat to the autonomous vehicle. 2. The inside challenge: Generating a safe trajectory for the autonomous vehicle in case of future predicted threat. The outside challenge is to predict the motion of surrounding vehicles. This requires building a reliable model through which future evolution of their position states can be predicted. Building these models is not trivial, as the surrounding vehicles' motion depends on human driver intentions and behaviors, which are highly uncertain. Various driver behavior predictive models have been proposed in the literature. However, most do not quantify trust in their predictions. We have proposed a trust-based driver behavior prediction method which combines all sensor measurements to output the probability (trust value) of a certain driver being "drowsy", "aggressive", or "normal". This method allows the autonomous vehicle to choose how much to trust a particular prediction. Once a picture is painted of surrounding vehicles, we can generate safe trajectories in advance – the inside challenge. Most existing approaches use stochastic optimal control methods, which are computationally expensive and impractical for fast real-time decision-making in crash scenarios. We have proposed a fast, proactive decision-making algorithm to generate crash avoidance trajectories based on Stochastic Model Predictive Control (SMPC). We reformulate the SMPC probabilistic constraints as deterministic constraints using convex hull formulation, allowing for faster real-time implementation. This deterministic SMPC implementation ensures in real-time that the vehicle maintains a minimum probabilistic safety.
APA, Harvard, Vancouver, ISO, and other styles
21

Pappaterra, Mauro José. "Implementing Bayesian Networks for online threat detection." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-86238.

Full text
Abstract:
Cybersecurity threats have surged in the past decades. Experts agree that conventional security measures will soon not be enough to stop the propagation of more sophisticated and harmful cyberattacks. Recently, there has been a growing interest in mastering the complexity of cybersecurity by adopting methods borrowed from Artificial Intelligence (AI) in order to support automation. Moreover, entire security frameworks, such as DETECT (Decision Triggering Event Composer and Tracker), are designed aimed to the automatic and early detection of threats against systems, by using model analysis and recognising sequences of events and other tropes, inherent to attack patterns. In this project, I concentrate on cybersecurity threat assessment by the translation of Attack Trees (AT) into probabilistic detection models based on Bayesian Networks (BN). I also show how these models can be integrated and dynamically updated as a detection engine in the existing DETECT framework for automated threat detection, hence enabling both offline and online threat assessment. Integration in DETECT is important to allow real-time model execution and evaluation for quantitative threat assessment. Finally, I apply my methodology to some real-world case studies, evaluate models with sample data, perform data sensitivity analyses, then present and discuss the results.
APA, Harvard, Vancouver, ISO, and other styles
22

Toppe, Michele L. "Creating Safer Campuses through Implementation of Threat-Assessment Teams| Are They Enough?" Thesis, University of Pennsylvania, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10281353.

Full text
Abstract:

According to higher education policy experts, “Campus threat assessment is not merely a recommendation, but an emerging standard of care.” However, despite evidence of the emergence of this standard and the consistency of recommendations that comport with those made by the Virginia Tech Review Panel, college campuses continue to vary significantly in their approaches to threat-assessment protocols. This study examines the extent to which campuses in the state of Illinois do vary and seeks to understand better the reasons for that variation. This research also examines the status of threat-assessment policies and protocols being conducted on three campuses and how the implementation of recommendations that followed Virginia Tech and Northern Illinois shootings have contributed to the creation of more optimally safe campuses. The study also examines the prevalence and consistency of the barriers that impede institutional efforts to detect and mitigate campus threats of violence.

Research sites included Northern Illinois University, where an incident of violence occurred in 2008, and the University of Illinois–Chicago and Illinois State University, where an incident of such magnitude has not yet occurred. The findings suggest that in states where the implementation of threat-assessment protocols and policies has been mandated by state law, campus leaders perceive these required measures to increase the preparedness of the campus environment. The research also suggests that even in Illinois, a state where such policy schemes are mandated, variation in the application of these policies and protocols persists. Findings suggest that even in states where policies are legislatively mandated, campuses continue to experience barriers to full implementation of recommendations that might lead to greater preparedness, including ambiguity regarding how best to balance the obligation to protect individual privacy and community security and to address self-harming behaviors and suicidality, the limited utility in zero-tolerance standards, institutional constraints in policy adoption and participation by the campus community, and insufficient dedication of institutional funding and support. The most significant barrier, however, was the unrealistic expectation that campus personnel be able to predict future behavior and events.

APA, Harvard, Vancouver, ISO, and other styles
23

Williams, David E. "Iran's nuclear program an assessment of the threat to the United States." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4323.

Full text
Abstract:
Approved for public release, distribution unlimited
This thesis explores the threat, if any, posed to the United States by the Iranian nuclear program. Specifically, it addresses whether Iran's pursuit of nuclear technology is likely to represent a threat for homeland defense (direct use of nuclear weapons) or homeland security (indirect use of nuclear weapons through intermediaries). It begins with an overview of the cooperation and conflict between the U.S. and Iran on a number of issues, but primarily in regard to nuclear technology. Next, it addresses Iranian intentions, motivations, and rationality for developing nuclear technology. The possible employment options for Iranian nuclear weapons are then reviewed and assessed in terms of their likelihood based on historical models of deterrence derived from the U.S.-Soviet relationship during the Cold War (direct use), as well as theoretical models of Pakistan's development of nuclear weapons (indirect use). It appears that Iran's pursuit of nuclear technology results from a combination of security concerns, pride, prestige, and a desire for regional leadership. Iran has rational motivations for pursuing nuclear technology; therefore, U.S. leaders should approach Iran as a rational actor in order to avert further conflict between the two states.
APA, Harvard, Vancouver, ISO, and other styles
24

Williams, David E. "Iran's nuclear program as assessment of the threat to the United States /." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FWilliams.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Hafez, Mohammed ; Kadhim, Abbas. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Iran, Nuclear weapons, Deterrence, Homeland defense, Homeland security. Includes bibliographical references (p. 81-90). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
25

Miehling, Erik J. "Stochastic target scheduling for radar resource management : threat assessment and optimal threshold policies." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/37417.

Full text
Abstract:
This thesis formulates a stochastic scheduler for use in adaptive resource management of a single Ground Moving Target Indicator (GMTI) radar when faced with tracking multiple, weakly maneuvering targets. The general problem involves first determining a priority allocation of the L targets, then determining the optimal time to spend using the specified allocation. We present a framework for computing the threat estimate and associated priority of each target in a surveillance environment, termed the radar macro-manager. The threat level of each target is computed based on its heading and proximity relative to a set of user-specified static assets. We present a weight assignment algorithm based on the geography of the surveillance region and use eigenvector centrality to assign vulnerability weights to each asset. The error in the threat level is computed based on the error-covariance matrix of each target, provided by a Kalman filter. Both the threat level and threat error are used to compute the respective priority rank distributions. From the priority distributions of each target we specify a queue of tasks to maximize a reward function associated with processing the queue. The queue is determined with the aid of structural results from the field of optimal issuing which involves ordering the priority rank distributions with respect to the monotone likelihood ratio. In particular, we compute an optimal queue which specifies the order in which we observe individual targets. The length of each target observation is controlled by an external stochastic process, termed the radar micro-manager. The problem of determining this optimal stopping time is formulated as a sequential decision process, a type of Markov decision process. We provide conditions such that the optimal policy is characterized by a monotone threshold policy on the partially ordered set of positive definite error covariance matrices of each target. Given that the optimal policy is monotone, we can efficiently approximate its form with an affine hyperplane using a hybrid random search - Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm. Detailed numerical simulations evaluate the performance of both the radar macro-manager and radar micro-manager.
APA, Harvard, Vancouver, ISO, and other styles
26

Leggett, Ted. "Transnational trafficking and the rule of law in West Africa : a threat assessment /." Vienna : UNODC, 2009. http://viewer.zmags.com/publication/d86db66e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mkerenga, Elizabeth Neema. "An Assessment of the threat of Right-Wing Populism in the European Parliament." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85991.

Full text
Abstract:
Over 500 million citizens in Europe are affected by the decisions taken at the European Union. However, the complexities of this supranational institution have people feeling voiceless and disengaged in the political system. The European Parliament - the organ meant to represent the European people – is alleged to being an elitist body that no longer represent the will of the ordinary citizen. This outcry of the people created the pool of potential for the rise of right-wing populist groups across Europe and their support has grown tremendously in what seems like a short span of time. But the tide is about to change. The surge of right-wing populism threatens to take over the European Parliament in the 2019 elections. This research paper sets out to assess the sphere of influence of right-wing populism at the regional level. Using a bottom-up approach, the paper focuses on the attitudes and perceptions of the people and analyses their opinions by incorporating Eatwell and Goodwin’s four D criteria. As the analytical framework, Eatwell and Goodwin’s criteria offers the avenue for inspecting the legitimacy of the right-wing ideology. Once this is established, the question of influence is answered by looking at the potential implication of right-wing power. As a qualitative case study, the research implores the use of raw data from existing secondary databases. The paper acknowledges the extensive studies and cross-examinations that have been conducted at the national level and seeks to build upon this knowledge and illustrate the interconnected nature of our societies. In addition, this research paper was completed before the May 2019 elections were concluded. The study indicates that right-wing supporters are motivated by the distrust of politicians and institutions, the destruction of the national group’s historic identity, perceived deprivation from rising inequalities and the de-alignment of people’s political positions. Furthermore, findings show a rising pattern of grievances rather than its decline. An indication that the phenomena of populism is here to stay. The polarization of right-wing populist groups in the political system threatens to tame the tone of politics if the institution does not take preventive action – some of which are discussed in the paper. With this in mind, the research paper acknowledges the threat of right-wing populism in the European Parliament.
APA, Harvard, Vancouver, ISO, and other styles
28

Ozkan, Baris Egemen. "Autonomous agent-based simulation of a model simulating the human air-threat assessment process." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOzkan.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Mattson-Hansen, Kimberly M. "Modeling Ecological Risks at a Landscape Scale: Threat Assessment in the Upper Tennessee River Basin." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78611.

Full text
Abstract:
There is no single methodology toward freshwater conservation planning, and few analytical tools exist for summarizing ecological risks at a landscape scale. I constructed a relative risk model, the Ecological Risk Index (ERI), to combine the frequency and severity of human-induced stressors with mappable land and water use data to evaluate impacts to five major biotic drivers: energy sources, physical habitat, flow regime, water quality, and biotic interactions. It assigns 3 final risk rankings based on a user-specified spatial grain. In a case study of the 5 major drainages within the upper Tennessee River basin (UTRB), U.S.A, differences in risk patterns among drainages reflected dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among watersheds. Also, the relative importance of threats is sensitive to the spatial grain of the analysis. An evaluation of the ERI procedures showed that the protocol is sensitive to how extent and severity of risk are defined, and threat frequency-class criteria strongly influenced final risk rankings. Multivariate analysis tested for model robustness and assessed the influence of expert judgment by comparing my original approach to a quantile-based approach. Results suggest that experts were less likely to assign catchments to high-risk categories than was the quantile approach, and that 3 final risk rankings were appropriate. I evaluated the influence of land use on freshwater ecosystems by studying the relationship between land cover changes and the persistence of freshwater mussels. First, historical species data were collected and the Upper Tennessee River Mussel Database (UTRMD) was constructed. The UTRMD contains >47,400 species records from 1963-2008 distributed across nearly 2,100 sampling sites. My study suggests that 30 years of land cover change does not explain observed freshwater mussel declines. Quantitative surveys are recommended basin-wide to provide more accurate information about mussel distribution and abundance. Lastly, results suggest that streams with repeated mussel surveys have increasing populations, including active recruitment in several beds. Additional quantitative surveys since 2004 have probably provided more accurate species and population counts, although actual population sizes are still uncertain.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
30

Anderson, Sterling J. Ph D. Massachusetts Institute of Technology. "A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/49876.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2009.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 111-117).
This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation task is formulated as a constrained optimal control problem with the constraints bounding a navigable region of the environment derived from forward -looking sensors. First, a constrained model predictive controller is designed to iteratively plan an optimal or "best-case" vehicle trajectory through the constrained corridor. This "best-case" scenario is then used to establish the minimum threat posed to the vehicle given its current state and driver inputs. Based on this threat assessment, the level of controller intervention required to prevent departure from the navigable corridor is calculated and driver/controller inputs are scaled accordingly. This approach minimizes controller intervention while ensuring that the vehicle does not depart from a navigable corridor. It also provides a unified architecture into which various vehicle models, actuation modes, trajectory-planning objectives, driver preferences, and levels of autonomy can be seamlessly integrated without changing the underlying controller structure. Simulated and experimental results are presented to demonstrate the framework's ability to incorporate multiple threat metrics and configurable intervention laws while sharing control with a human driver. Various maneuvers are tested, including lane-keeping, hazard avoidance, and multiple hazard avoidance and show that this framework capable of maintaining vehicle stability while semi-autonomously avoiding road hazards and conceding significant control to the human driver.
by Sterling J. Anderson.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
31

Papadopoulos, Nikolaos. "How Secure are you Online? : A Cybersecurity Assessment of the Recommendations Provided to Swedish Citizens." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104921.

Full text
Abstract:
With computers, mobile phones and other smart devices being an increasingly part of peoples lives. It is important now, more than ever that people know how to operate them safely and stay protected in the cyber landscape. For citizens to understand how to stay protected online, it is important to understand what to stay safe from. This thesis is therefore examining the cyber threat landscape to understand what threats pose the greatest threat to users. To understand the prerequisites people have in defending themselves, the thesis also examines and evaluates what are recommendations provided to the general public. The results show that the biggest threat is malware with phishing being the usual access vector for it. Recommendations seem to fall behind in reflecting the most prevalent threats, but manage to stay relevant nonetheless.
APA, Harvard, Vancouver, ISO, and other styles
32

Phillips, Richard Hyland. "The evolution of Soviet military and civilian threat assessment in the Gorbachev era : fragmentation and competition." Thesis, Massachusetts Institute of Technology, 1991. https://hdl.handle.net/1721.1/126351.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 1991.
Includes bibliographical references (leaves 276-334).
by Richard Hyland Phillips.
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 1991.
APA, Harvard, Vancouver, ISO, and other styles
33

Powar, Nilesh U. "An Approach for the Extraction of Thermal Facial Signatures for Evaluating Threat and Challenge Emotional States." University of Dayton / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1386697359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kolbeinsson, Ari. "Visualising uncertainty in aircraft cockpits : Is icon degradation an appropriate visualisation form." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-8342.

Full text
Abstract:
Visualising uncertainty information has been a research area for the past decade or so, and this thesis contains the results of an experiment that examines whether prior research on icon degradation for showing uncertainty can be used in a simulated aircraft cockpit environment. Using icon degradation has been suggested as being effective to combat overconfidence bias, as well as to accurately convey information about uncertainty. Two icon sets using icon degradation were taken from prior research, and one new icon set using shape change and colour change was created for comparison. Subjects flew a flight simulator while reading icons to evaluate the uncertainty displayed, and also evaluating their own confidence in their reading. The results show that shape change leads to much higher accuracy in reading icons, and slightly higher levels of confidence. Furthermore, icon degradation results in a higher variance in reading icons and an increase in errors when no time-pressure or distraction is present. This suggests that the suitability of icon degradation for showing uncertainty is questionable in all situations, and that other design approaches such as shape change should be considered. Furthermore, problems were uncovered in the prior research that the old icons were taken from, and these problems call into question the general approach used in that research. Keywords: Uncertainty visualisation, Naturalistic decision-making, NDM, Aviation, Aircraft cockpit, Decision support, Situation assessment, Threat assessment.
APA, Harvard, Vancouver, ISO, and other styles
35

Bakare, Adeyinka A. "A Methodology for Cyberthreat ranking: Incorporating the NIST Cybersecurity Framework into FAIR Model." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1583247043269043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Keith, Mark. "Conservation assessment of South African mammals." Thesis, Connect to this title online, 2005. http://upetd.up.ac.za/thesis/available/etd-02142006-162024/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bernhardt, Wilhelm. "A qualitative conceptual framework for conducting risk- and threat assessment in the South African domestic intelligence environment." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-05052005-162339/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ayhan, Murat. "A Model-based Guidance And Vulnerability Assessment Approach For Facilities Under The Threat Of Multi-hazard Emergencies." Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614534/index.pdf.

Full text
Abstract:
Disasters (e.g. earthquakes) and emergencies (e.g. fire) threaten the safety of occupants in the buildings and cause injuries and mortalities. These harmful effects are even more dangerous when secondary hazards (e.g. post-earthquake fires) emerge and it is commonly observed that the disasters/emergencies trigger secondary hazards.An effective indoor emergency guidance and navigation approach for occupants and first responders can decrease the number of injuries and mortalities during building emergencies by improving the evacuation process and response operations. For this reason, this research will propose a model-based guidance and vulnerability assessment approach for facilities that are under the threat of multi-hazard emergencies. The approach can be used to guide occupants from the facility affected by disasters/emergencies to safer zones and to direct the first responders by supplying them necessary building related information such as identified vulnerable locations in the indoor environments. An integrated utilization of Building Information Modeling tools, sensors, shortest path algorithms, and vulnerability assessment algorithms is proposed for the system in this research. The research steps of this thesis include (1) determination of requirements of an indoor navigation during emergency response and disaster management,(2) review, comparison, and evaluation of shortest path algorithms from an emergency response and disaster management point of view, (3) proposing a vulnerability assessment approach, and (4) proposing a real-time indoor emergency guidance and navigation system framework for buildings under the threat of multi-hazard emergencies. The findings of the research can be used in future studies on emergency response and disaster management domains.
APA, Harvard, Vancouver, ISO, and other styles
39

Dunn, John Glen Hunter. "Measurement and conceptual issues regarding the assessment of situational threat and competitive trait anxiety in ice hockey." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0007/NQ29031.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Constantin, Alexandre S. M. Massachusetts Institute of Technology. "A margin-based approach to vehicle threat assessment in a homotopy framework for semi-autonomous highway navigation." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/92146.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 139-145).
This thesis describes the design of an unified framework for threat assessment and the shared control between a human driver and the onboard controller, based on the notion of fields of safe travel. It allows to perform corridor navigation, trajectory planning, threat assessment and driving assistance in hazardous situations. A new approach to the threat assessment problem is introduced, based upon the estimation of the control freedom afforded to a vehicle. Given sensor information of the surrounding environment, an algorithm first identifies corridors of travel through which the vehicle can safely navigate. The second stage then consists in assessing the potential threat posed to the vehicle in each identified corridor thanks to a metric associated with available control margin. For this purpose, the fields of safe travel are associated with sets of homotopic trajectories generated either from a lattice sampled in the vehicles input space or from a conformal state lattice. This level of threat is the keystone of the system and serves as input to influence autonomous navigation or driver support inputs. The semi-autonomous control system aims to honor safe driver inputs while ensuring safe and robust navigation properties. It ideally operates only during instances of significant threat: it should give a driver full control of the vehicle in "low threat" situations but apply appropriate levels of computer-controlled actuator effort during "high threat" situations. This approach preserves the freedom of control of the human driver when he/she remains within a safe navigable corridor, and adjust the vehicle trajectory when its predicted future state falls out of a safe field, or when the lowest threat exceeds some threshold. In fully autonomous mode, this human-inspired motion planning approach ensures collision free navigation and driving comfort.
by Alexandre Constantin.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
41

Njoroge, Lydia. "From Property to Person: Understanding the Mediating Role of Control on Ovulation in the Female Consumer Experience." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538790/.

Full text
Abstract:
My aim is to design a research program that emphasizes inclusivity through empiricism rather than anecdotes and benevolent sexism. To accomplish this goal, I review and build on the work assessing the influence of fertility in the female consumer experience (FCE). Fertility, especially menstruation, has been used anecdotally for too long. This research was designed to address the gap in knowledge around the way in which women perceive advertisements. More specifically, the role fertility plays in the process women go through when assessing advertisements and offerings. Does a woman's desire to seek variety become reduced when she sees a rival endorsing the offering? If this is the case, then there is a need to find a mediating variable that can overcome this effect. Internal locus of control, the level a person feels they are in control of the outcomes in their lives, was selected as a starting point. Having a high internal LOC should buffer a person's perceptions of another as a threat. A cross-sectional design from a convenience sample of university students was used to address a series of five research questions: 1) Does fertility status influence locus of control, 2) Does fertility status influence rival assessment, 3) Does locus of control mediate rival assessment, 4) Does rival assessment influence advertisement assessment and purchase intent, and 5) Does external locus of control have more than a single factor? The results from the multiple one-way ANOVAs and linear regressions were not significant, but it was promising given the limitations of the study. Namely, the rate of unusable data combined with the rate of birth control use limited the final analyses to a sample of 62 cases. Additional considerations and future research directions are outlined in chapter 5.
APA, Harvard, Vancouver, ISO, and other styles
42

He, Xiaobing [Verfasser], Hermann de [Akademischer Betreuer] Meer, and Stefan [Akademischer Betreuer] Rass. "Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks / Xiaobing He ; Hermann de Meer, Stefan Rass." Passau : Universität Passau, 2017. http://d-nb.info/114461144X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hendrick, Lindsey R. F. "Climate Change and Mountaintop Removal Mining: A MaxEnt Assessment of the Potential Dual Threat to West Virginia Fishes." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5291.

Full text
Abstract:
Accounts of species’ range shifts in response to climate change, most often as latitudinal shifts towards the poles or upslope shifts to higher elevations, are rapidly accumulating. These range shifts are often attributed to species ‘tracking’ their thermal niches as temperatures in their native ranges increase. Our objective was to estimate the degree to which climate change-driven shifts in water temperature may increase the exposure of West Virginia’s native freshwater fishes to mountaintop removal surface coal mining. Mid-century shifts in habitat suitability for nine non-game West Virginia fishes were projected via Maximum Entropy species distribution modeling, using a combination of physical habitat, historical climate conditions, and future climate data. Modeling projections for a high-emissions scenario (Representative Concentration Pathway 8.5) predict that habitat suitability will increase in high elevation streams for eight of nine species, with marginal increases in habitat suitability ranging from 46-418%. We conclude that many West Virginia fishes will be at risk of increased exposure to mountaintop removal surface coal mining if climate change continues at a rapid pace.
APA, Harvard, Vancouver, ISO, and other styles
44

Norén, Viveca. "When water becomes a threat : Risk assessment and risk management plans for floods and drinking water in Swedish practice." Doctoral thesis, Uppsala universitet, Luft-, vatten och landskapslära, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-301940.

Full text
Abstract:
Water is an essential but vulnerable resource. A shortage of good quality drinking water is a threat to human health and society as a whole. Abundance of water in the form of floods can also be a serious threat which can have consequences for the drinking water supply. To reduce these risks there is a need for systematic risk reduction. In the last decades a risk management approach has been developed in the management of both flood and drinking water risks. This means that a reactive, ad hoc management is being replaced by a more proactive and systematic approach where risks are analysed and evaluated as a basis for prioritising counter-measures. The complex nature of water issues has also made it evident that there is a need for a holistic view of the management, involving a variety of actors and sectors. An integrated management approach to floods and water resources has emerged. This thesis aims to examine how local level risk management, especially risk assessments, of floods and drinking water supply have been or can be performed in practice in Sweden. The existing practices have been characterised in relation to current risk management frameworks. Furthermore, the thesis aims to investigate how the effects of flood on drinking water supply have been considered in risk assessment methods and in flood risk management plans, as well as whether flood and drinking water risks have been considered in an integrated manner. The studies are based on interviews with flood risk managers in Swedish municipalities and Swedish water producers as well as on document studies of risk assessment methods and flood risk management plans. There are large variations between different municipalities and water producers in how, and to what extent, risk assessments have been performed. Some have performed very little, if any, risk assessment while others have worked systematically. The tools used are often those that are promoted by national agencies and are often less advanced than those described in the literature. The risk assessments do not always cover all relevant aspects of the risk and few actors have discussed an acceptable risk level. Flood risk assessments focus mostly on the exposure of objects to flood and investigate the consequences of such an exposure only to a limited extent. The incomplete risk assessments may result in a biased view of the risk which in turn can lead to poor decision-making. The theoretical knowledge about risk management is in many cases low and there is still often a practical approach. Strategic and holistic approaches are mostly lacking. The consequences of flood on drinking water supply are not known in detail and are not considered in detail in risk assessments commonly used in Sweden. There is an awareness of the need to coordinate the management of flood and water resources. However, despite the good intentions regarding integration, there are few signs in the risk assessments and risk management plans that integration is actually occurring. Both the risk management approach and integrated management have started to be implemented in Swedish flood and drinking water risk management. It is however on a basic level and it is still a long way to go. Further guidance and knowledge about risk management as well as commitment from and collaboration among all actors concerned is needed to make this development possible.
Vatten är en livsnödvändig men sårbar resurs. Brist på dricksvatten av god kvalitet är ett allvarligt hot mot människors hälsa och för hela samhället. Även överflöd av vatten i form av översvämningar kan vara ett allvarligt hot och kan bland annat får konsekvenser för dricksvattenförsörjningen. För att minska dessa risker finns det behov av systematiskt riskreducerande arbete. De senaste decennierna har systematisk riskhantering (risk management approach) utvecklats inom hanteringen av översvämningar och dricksvattenförsörjning. Detta innebär att en reaktiv och osystematisk hantering ersätts med en mer proaktiv och systematisk hantering baserad på analys och utvärdering av risker som stöd för beslutsfattande. Den komplexitet som vattenfrågor omfattar har också gjort det tydligt att det finns behov av en helhetsyn på hur vatten hanteras och att ett flertal aktörer och sektorer behöver involveras. Teorier om integrerad hantering (integrated management) har vuxit fram och börjat implementeras. Syftet med denna avhandling är att undersöka hur riskhantering, särskilt riskbedömningar, på lokal nivå utförs eller kan utföras i praktiken i Sverige. Praktiken har beskrivits och karakteriserats i förhållande till befintliga ramverk om riskhantering. Dessutom är syftet att undersöka hur konsekvenser av översvämningar på dricksvattenförsörjningen behandlas i metoder för riskbedömning och riskhanteringsplaner för översvämning liksom att studera om risker relaterade till översvämningar och dricksvatten har behandlats på ett integrerat sätt. Studierna är baserad på intervjuer med översvämningshanterare i svenska kommuner och svenska vattenproducenter samt dokumentstudier av metoder för riskbedömning och riskhanteringsplaner för översvämning. Det är stora skillnader mellan hur och i vilken omfattning olika kommuner och vattenproducenter har gjort riskbedömningar. Vissa har knappt gjort någon riskbedömning alls medan andra har arbetat mer systematiskt. De verktyg som används är ofta de som finns i handböcker från svenska myndigheter och är ofta mindre avancerade än vad som beskrivs i litteraturen. Riskbedömningarna täcker inte alltid all relevanta aspekter av risken och det är få som har diskuterat vad som är en acceptabel risknivå. Översvämningsbedömningarna har fokuserat på vilka objekt som exponeras vid en översvämning och möjliga konsekvenser på drabbade objekt har undersökts i mycket begränsad utsträckning. Ofullständiga riskbedömningar kan ge en felaktig bild av risken och därmed vara ett inkomplett underlag för beslutsfattande. Den teoretiska kunskapen om riskhantering är i många fall låg och många har en praktisk inställning till riskhanteringen. Det saknas oftast strategi och helhetstänkande. Kunskapen om konsekvenser av översvämning på dricksvattenförsörjningen är begränsad och behandlas inte heller i detalj i de metoder för riskbedömning som är mest vanligt förekommande i Sverige. Det finns en medvetenhet om behovet av att koordinera hanteringen av översvämning och vattenresurser. Trots de goda intentionerna om integrering visar riskbedömningar och riskhanteringsplaner få tecken på att integrering sker i praktiken. Både systematisk riskhantering och integrerad hantering är synsätt som har börjat utvecklas och implementeras inom svensk hantering av översvämningar och dricksvattenförsörjning. Det sker dock fortfarande på en relativt grundläggande nivå och det är en lång väg kvar. Det finns behov av ytterligare vägledning och mer kunskap om riskhantering liksom engagemang från och samarbete mellan alla berörda aktörer för att stödja vidare utveckling.
APA, Harvard, Vancouver, ISO, and other styles
45

Radholm, Fredrik, and Niklas Abefelt. "Ethical Hacking of an IoT-device: Threat Assessment and Penetration Testing : A Survey on Security of a Smart Refrigerator." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280295.

Full text
Abstract:
Internet of things (IoT) devices are becoming more prevalent. Due to a rapidly growing market of these appliances, improper security measures lead to an expanding range of attacks. There is a devoir of testing and securing these devices to contribute to a more sustainable society. This thesis has evaluated the security of an IoT-refrigerator by using ethical hacking, where a threat model was produced to identify vulnerabilities. Penetration tests were performed based on the threat model. The results from the penetration tests did not find any exploitable vulnerabilities. The conclusion from evaluating the security of this Samsung refrigerator can say the product is secure and contributes to a connected, secure, and sustainable society.
Internet of Things (IoT) enheter blir mer allmänt förekommande. På grund av en snabbt expanderande marknad av dessa apparater, har bristfälliga säkerhetsåtgärder resulterat till en mängd olika attacker. Det finns ett behov att testa dessa enheter for att bidra till ett mer säkert och hållbart samhälle. Denna avhandling har utvärderat säkerheten av ett IoT-kylskåp genom att producera en hot modell för att identifiera sårbarheter. Penetrationstester har utförts på enheten, baserade på hot modellen. Resultatet av penetrationstesterna hittade inga utnyttjningsbara sårbarheter. Slutsatsen från utvärderingen av säkerheten på Samsung-kylskåpet är att produkten är säker och bidrar till ett uppkopplat, säkert, och hållbart samhälle.
APA, Harvard, Vancouver, ISO, and other styles
46

Edmed, Shannon L. "The influence of psychosocial factors on expectations and persistent symptom report after mild traumatic brain injury." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/78670/6/Shannon_Edmed_Thesis.pdf.

Full text
Abstract:
This thesis examines how psychosocial factors influence the report of persistent symptoms after mild traumatic brain injury. Using quasi-experimental methods, the research program demonstrates how factors unrelated to trauma-induced physiological brain damage can contribute to persistent symptoms after a mild traumatic brain injury. The results of this thesis highlight the possibility that outcome from mild traumatic brain injury could be improved by targeting psychosocial factors.
APA, Harvard, Vancouver, ISO, and other styles
47

Munir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.

Full text
Abstract:
Cisco 2014 Annual Security Report clearly outlines the evolution of the threat landscape and the increase of the number of attacks. The UK government in 2012 recognised the cyber threat as Tier-1 threat since about 50 government departments have been either subjected to an attack or a direct threat from an attack. The cyberspace has become the platform of choice for businesses, schools, universities, colleges, hospitals and other sectors for business activities. One of the major problems identified by the Department of Homeland Security is the lack of clear security metrics. The recent cyber security breach of the US retail giant TARGET is a typical example that demonstrates the weaknesses of qualitative security, also considered by some security experts as fuzzy security. High, medium or low as measures of security levels do not give a quantitative representation of the network security level of a company. In this thesis, a method is developed to quantify the security risk level of known and unknown attacks in an enterprise network in an effort to solve this problem. The identified vulnerabilities in a case study of a UK based company are classified according to their severity risk levels using common vulnerability scoring system (CVSS) and open web application security project (OWASP). Probability theory is applied against known attacks to create the security metrics and, detection and prevention method is suggested for company network against unknown attacks. Our security metrics are clear and repeatable that can be verified scientifically.
APA, Harvard, Vancouver, ISO, and other styles
48

Haller, Vanessa. "Ecological models for threat management: Considering the unknowns using numerical analysis and machine learning." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/210467/1/Vanessa_Haller_Thesis.pdf.

Full text
Abstract:
The thesis tackles the problem of uncertainty in the modelling of ecosystems of any complexity. This uncertainty can originate from many sources including missing knowledge of interactions or low data availability. The major contribution of the thesis is a new workflow that extends on the traditional scientific method to allow for the thorough investigation of uncertainty in especially data poor system utilising new techniques such as machine learning.
APA, Harvard, Vancouver, ISO, and other styles
49

Olson, Dean T. "The path to terrorist violence : a threat assessment model for radical groups at risk of escalation to acts of terrorism." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FOlson.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.
Thesis Advisor(s): David Tucker. Includes bibliographical references (p. 59-65). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
50

Wei, Christina C. "The Role of Response Expectancies in Neuropsychological Performance in Young Adults Concerned about Attention-Deficit/Hyperactivity Disorder." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1367333253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography