Journal articles on the topic 'Threat Assessment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threat Assessment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chandler, Gena E., and Jennifer Sano-Franchini. "Threat Assessment." Pedagogy 20, no. 1 (January 1, 2020): 87–100. http://dx.doi.org/10.1215/15314200-7879069.
Full textGelles, Michael G., Kim Sasaki-Swindle, and Russell E. Palarea. "Threat Assessment." Journal of Threat Assessment 2, no. 1 (January 2002): 55–66. http://dx.doi.org/10.1300/j177v02n01_04.
Full textKRASIŃSKI, MSc, Wojciech. "THREAT ASSESSMENT IN THE NATIONAL CRISIS MANAGEMENT PLANS IN POLAND AFTER 2010." Zeszyty Naukowe Akademii Sztuki Wojennej 117, no. 4 (July 29, 2020): 58–68. http://dx.doi.org/10.5604/01.3001.0014.3424.
Full textMUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.
Full textPardue, Harold, Jeffrey P. Landry, and Alec Yasinsac. "E-Voting Risk Assessment." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 19–35. http://dx.doi.org/10.4018/jisp.2011070102.
Full textDeng, Fang, Xinan Liu, Zhihong Peng, and Jie Chen. "A Threat Assessment Method Based on Hierarchies and Modules." Journal of Advanced Computational Intelligence and Intelligent Informatics 18, no. 1 (January 20, 2014): 93–99. http://dx.doi.org/10.20965/jaciii.2014.p0093.
Full textNostro, Nicola, Andrea Ceccarelli, Andrea Bondavalli, and Francesco Brancati. "Insider Threat Assessment." ACM SIGOPS Operating Systems Review 48, no. 2 (December 5, 2014): 3–12. http://dx.doi.org/10.1145/2694737.2694740.
Full textSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Full textStrong, Ken, and Dewey Cornell. "Student Threat Assessment in Memphis City Schools: A Descriptive Report." Behavioral Disorders 34, no. 1 (November 2008): 42–54. http://dx.doi.org/10.1177/019874290803400104.
Full textHuddleston, S. H., and D. E. Brown. "A Statistical Threat Assessment." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 39, no. 6 (November 2009): 1307–15. http://dx.doi.org/10.1109/tsmca.2009.2027611.
Full textDvorkin, Vladimir. "COMPROMISE IN THREAT ASSESSMENT." Security Index: A Russian Journal on International Security 16, no. 2 (April 2010): 99–101. http://dx.doi.org/10.1080/19934271003595210.
Full textEwing, Charles Patrick. "Introduction to threat assessment." Behavioral Sciences & the Law 17, no. 3 (July 1999): 251–52. http://dx.doi.org/10.1002/(sici)1099-0798(199907/09)17:3<251::aid-bsl353>3.0.co;2-2.
Full textZeng, Min, Chuanzhou Dian, and Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN." Sustainability 15, no. 1 (December 28, 2022): 491. http://dx.doi.org/10.3390/su15010491.
Full textAli, Nida, Cory Cooperman, Jonas P. Nitschke, Mark W. Baldwin, and Jens C. Pruessner. "The effects of suppressing the biological stress systems on social threat-assessment following acute stress." Psychopharmacology 237, no. 10 (June 29, 2020): 3047–56. http://dx.doi.org/10.1007/s00213-020-05591-z.
Full textPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Full textYang, Hongyu, Renyun Zeng, Fengyan Wang, Guangquan Xu, and Jiyong Zhang. "An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things." Security and Communication Networks 2020 (November 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/6656066.
Full textWu, Ke He, Shi Chao Ye, and Yu Guang Niu. "An Evaluation Method for Information Security Level Based on OWA Operator and Bayesian Network." Applied Mechanics and Materials 411-414 (September 2013): 72–75. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.72.
Full textXIE, Li-xia, Dian-sheng JIANG, Li ZHANG, and Hong-yu YANG. "Vulnerability threat correlation assessment method." Journal of Computer Applications 32, no. 3 (April 1, 2013): 679–82. http://dx.doi.org/10.3724/sp.j.1087.2012.00679.
Full textChunlin, Liu, and Rohan Gunaratna. "The Terrorist Threat Assessment 2020." UNISCI Journal 18, no. 52 (January 2020): 125–29. http://dx.doi.org/10.31439/unisci-79.
Full textTeichmann, Clemens, Stephan Renatus, and Jörn Eichler. "Agile Threat Assessment and Mitigation." International Journal of Secure Software Engineering 7, no. 1 (January 2016): 1–16. http://dx.doi.org/10.4018/ijsse.2016010101.
Full textCornell, Dewey. "Threat Assessment in College Settings." Change: The Magazine of Higher Learning 42, no. 1 (January 2010): 8–15. http://dx.doi.org/10.1080/00091380903448997.
Full textBolante, Rebecca, and Cass Dykeman. "Threat assessment in community colleges." Journal of Threat Assessment and Management 2, no. 1 (March 2015): 23–32. http://dx.doi.org/10.1037/tam0000033.
Full textSmith, Martin. "Threat assessment and risk analysis." Computer Fraud & Security Bulletin 1991, no. 11 (November 1991): 6–13. http://dx.doi.org/10.1016/0142-0496(91)90176-6.
Full textZaiss, Jim, Razieh Nokhbeh Zaeem, and K. Suzanne Barber. "Identity Threat Assessment and Prediction." Journal of Consumer Affairs 53, no. 1 (May 17, 2018): 58–70. http://dx.doi.org/10.1111/joca.12191.
Full textdu Preez, Gert T., and Carl W. I. Pistorius. "Technological Threat and Opportunity Assessment." Technological Forecasting and Social Change 61, no. 3 (July 1999): 215–34. http://dx.doi.org/10.1016/s0040-1625(99)00037-2.
Full textKaplan, Sebastian G., and Dewey G. Cornell. "Threats of Violence by Students in Special Education." Behavioral Disorders 31, no. 1 (November 2005): 107–19. http://dx.doi.org/10.1177/019874290503100102.
Full textMykhailova, A., S. Chumachenko, Yе Morsch, and A. Partalian. "Мethods of complex operational expert assessment of military-man-made threats in the united forces operation area." Scientific bulletin: Сivil protection and fire safety 1, no. 1 (December 1, 2020): 23–33. http://dx.doi.org/10.33269/nvcz.2020.1.23-33.
Full textZhang, Shuqin, Peng Chen, Guangyao Bai, Shijie Wang, Minzhi Zhang, Shuhan Li, and Chunxia Zhao. "An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix." Wireless Communications and Mobile Computing 2022 (August 8, 2022): 1–12. http://dx.doi.org/10.1155/2022/7875910.
Full textРАNСНENKO, O. "Current issues of cyber threat risk assessment: analysis of foreign experience." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 106–12. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248824.
Full textEmrich, Christopher T., Yao Zhou, Sanam K. Aksha, and Herbert E. Longenecker. "Creating a Nationwide Composite Hazard Index Using Empirically Based Threat Assessment Approaches Applied to Open Geospatial Data." Sustainability 14, no. 5 (February 25, 2022): 2685. http://dx.doi.org/10.3390/su14052685.
Full textWald, I., G. Lubin, Y. Holoshitz, D. Muller, E. Fruchter, D. S. Pine, D. S. Charney, and Y. Bar-Haim. "Battlefield-like stress following simulated combat and suppression of attention bias to threat." Psychological Medicine 41, no. 4 (November 26, 2010): 699–707. http://dx.doi.org/10.1017/s0033291710002308.
Full textBattisti, Corrado, Marisa Perchinelli, Sharon Vanadia, Pietro Giovacchini, and Letizia Marsili. "Monitoring Effectiveness of an Operational Project on Two Threatened Landbirds: Applying a Before–After Threat Analysis and Threat Reduction Assessment." Land 12, no. 2 (February 12, 2023): 464. http://dx.doi.org/10.3390/land12020464.
Full textCao, Yuan, Ying-Xin Kou, An Xu, and Zhi-Fei Xi. "Target Threat Assessment in Air Combat Based on Improved Glowworm Swarm Optimization and ELM Neural Network." International Journal of Aerospace Engineering 2021 (October 6, 2021): 1–19. http://dx.doi.org/10.1155/2021/4687167.
Full textCao, YanYan, Jingzhen Yang, Marizen Ramirez, and Corinne Peek-Asa. "Characteristics of Workplace Threats Requiring Response From a University Threat Assessment Team." Journal of Occupational and Environmental Medicine 55, no. 1 (January 2013): 45–51. http://dx.doi.org/10.1097/jom.0b013e31826bb66a.
Full textPavlík, Lukáš, Martin Ficek, and Jakub Rak. "Dynamic Assessment of Cyber Threats in the Field of Insurance." Risks 10, no. 12 (November 22, 2022): 222. http://dx.doi.org/10.3390/risks10120222.
Full textSchaad, N. W., J. Abrams, L. V. Madden, R. D. Frederick, D. G. Luster, V. D. Damsteegt, and A. K. Vidaver. "An Assessment Model for Rating High-Threat Crop Pathogens." Phytopathology® 96, no. 6 (June 2006): 616–21. http://dx.doi.org/10.1094/phyto-96-0616.
Full textGraney, Daniel. "Behavioral Intervention Teams Using Threat Assessment." Journal of Campus Behavioral Intervention 2 (November 1, 2014): 48–63. http://dx.doi.org/10.17732/jbit2014/4.
Full textLI Jiang, 李姜, and 郭立红 GUO Li-hong. "Target threat assessment using improved SVM." Optics and Precision Engineering 22, no. 5 (2014): 1354–62. http://dx.doi.org/10.3788/ope.20142205.1354.
Full textSatpute, Sanjay V. "Biodiversity Threat Assessment of Ethnomedicinal Plants." International Journal of Scientific and Research Publications (IJSRP) 10, no. 2 (February 24, 2020): p9868. http://dx.doi.org/10.29322/ijsrp.10.02.2020.p9868.
Full textBadey, T. J. "Nuclear Terrorism: Actor-based Threat Assessment." Intelligence and National Security 16, no. 2 (June 2001): 39–54. http://dx.doi.org/10.1080/714002889.
Full textHarris, Andrew J., and Arthur J. Lurigio. "Threat Assessment and Law Enforcement Practice." Journal of Police Crisis Negotiations 12, no. 1 (May 2012): 51–68. http://dx.doi.org/10.1080/15332586.2012.645375.
Full textLele, A. V. "Biological terrorism: Threat and risk assessment." Strategic Analysis 26, no. 3 (July 2002): 341–55. http://dx.doi.org/10.1080/09700160208450051.
Full textHoquante, Marine, Morgane Sanselme, Ivo B. Rietveld, and Gérard Coquerel. "Disappearing Conglomerates, Assessment of the Threat." Crystal Growth & Design 19, no. 12 (October 25, 2019): 7396–401. http://dx.doi.org/10.1021/acs.cgd.9b01316.
Full textLouvar Reeves, Melissa A., and Stephen E. Brock. "School Behavioral Threat Assessment and Management." Contemporary School Psychology 22, no. 2 (October 4, 2017): 148–62. http://dx.doi.org/10.1007/s40688-017-0158-6.
Full textMcCarthy, Claudine. "Improve behavioral intervention, threat assessment efforts." Campus Security Report 11, no. 10 (January 21, 2015): 1–6. http://dx.doi.org/10.1002/casr.30020.
Full textKirenko, Serhii. "Problems of criminal-legal assessment of mental violence." Slovo of the National School of Judges of Ukraine, no. 1(34) (July 5, 2021): 128–39. http://dx.doi.org/10.37566/2707-6849-2021-1(34)-11.
Full textSadono, Mahardi, Saphira Alifa Harahap, Dani Yulianto Putra, Randhy Randhy, and Muhamad Luthfi Imam Nurhakim. "Risk Assessment Approach in Airport Security." INSIST 2, no. 2 (January 25, 2019): 84. http://dx.doi.org/10.23960/ins.v2i2.86.
Full textGiovacchini, Pietro, Corrado Battisti, and Letizia Marsili. "Evaluating the Effectiveness of a Conservation Project on Two Threatened Birds: Applying Expert-Based Threat Analysis and Threat Reduction Assessment in a Mediterranean Wetland." Diversity 14, no. 2 (January 28, 2022): 94. http://dx.doi.org/10.3390/d14020094.
Full textSharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (July 31, 2021): 1849. http://dx.doi.org/10.3390/electronics10151849.
Full textKurzman, Charles, Ahsan Kamal, and Hajar Yazdiha. "Ideology and Threat Assessment: Law Enforcement Evaluation of Muslim and Right-Wing Extremism." Socius: Sociological Research for a Dynamic World 3 (January 1, 2017): 237802311770477. http://dx.doi.org/10.1177/2378023117704771.
Full text