Academic literature on the topic 'Threat modelling'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat modelling.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threat modelling"

1

Meland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.

Full text
Abstract:
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specificall
APA, Harvard, Vancouver, ISO, and other styles
2

Paskauskas, R. Andrew. "Decoding 5G security: toward a hybrid threat ontology." Open Research Europe 4 (March 6, 2025): 34. https://doi.org/10.12688/openreseurope.16916.2.

Full text
Abstract:
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure. The 5G Hybrid Threat Ontology is a structured framework designed to reduce risk and achieve sustainable resilience against hybrid threats targeting 5G infrastructure. As fifth-generation (5G) networks become integral to critical infrastructure, they introduce new vulnerabilities that adversaries can exploit through hybrid threats—multifaceted attacks spanning cyber, physical, and socio-political
APA, Harvard, Vancouver, ISO, and other styles
3

Novokhrestov, A., A. Konev, A. Shelupanov, and A. Buymov. "Computer network threat modelling." Journal of Physics: Conference Series 1488 (March 2020): 012002. http://dx.doi.org/10.1088/1742-6596/1488/1/012002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brazhuk, A. I., and E. V. Olizarovich. "Ontological analysis in the problems of container applications threat modelling." Informatics 20, no. 4 (2023): 69–86. http://dx.doi.org/10.37661/1816-0301-2023-20-4-69-86.

Full text
Abstract:
Objectives. The main purpose of the work is the experimental verification of the method of automatic threat modelling based on the ontological approach using the example of multicomponent container applications presented in the form of data flow diagrams.Methods. Methods of ontological modelling and knowledge management are used in the work. The Web Ontology Language is used to represent knowledge; automatic reasoning based on description logics is used for threat modelling.Results. A machine-readable set (dataset) of 200 data flow diagrams is developed; each diagram is obtained from the confi
APA, Harvard, Vancouver, ISO, and other styles
5

Kulović, Jasmina, Sabina Baraković, and Jasmina Baraković Husić. "Analysis of Threats for Web of Things (WoT) System." B&H Electrical Engineering 14, no. 2 (2020): 19–27. http://dx.doi.org/10.2478/bhee-2020-0009.

Full text
Abstract:
Abstract The Web of Things (WoT) emerges from applying Web technologies to the Internet of Things (IoT) to access information and services of physical objects. These systems are likely to characterize the future of digital environment and they put certain security issues in the story. In order to help detect potential threats to WoT-system that is being built and designed, it is advisory to implement a threat modelling process. Threat modelling is an engineering technique that can be used to identify threats, attacks, vulnerabilities and appropriate countermeasures in the context of a particul
APA, Harvard, Vancouver, ISO, and other styles
6

Suhas, Kelkar Siddhi. "Evaluation of Threat Models." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 809–13. http://dx.doi.org/10.22214/ijraset.2023.49311.

Full text
Abstract:
Abstract: Information system security is the integrity and safety of its resources and activities. In the cyber world, it can be almost impossible to trace sophisticated attacks to their true source. The anonymity enjoyed by the malicious user or cyber attackers pose a grave threat to the global information society. Cyber threat modelling is an analytical process that is used to identify the potential threats against a system or an organization. It is a core activity and a fundamental practice in the process of building trusted technology. Threat modelling has been identified as one of the bes
APA, Harvard, Vancouver, ISO, and other styles
7

Kelkar, Siddhi Suhas. "Evaluation of Threat Models." International Journal of Innovative Science and Research Technology 8, no. 2 (2023): 1948–52. https://doi.org/10.5281/zenodo.7723042.

Full text
Abstract:
Information system security is the integrity and safety of its resources and activities. In the cyber world, it can be almost impossible to trace sophisticated attacks to their true source. The anonymity enjoyed by the malicious user or cyber attackers pose a grave threat to the global information society. Cyber threat modelling is an analytical process that is used to identify the potential threats against a system or an organization. It is a core activity and a fundamental practice in the process of building trusted technology. Threat modelling has been identified as one of the best "re
APA, Harvard, Vancouver, ISO, and other styles
8

Mahendra V, Manjunatha G S, Dr. Nagaraja G S, and Dr. Shushrutha K S. "Network Threat Detection and Modelling." International Journal of Emerging Science and Engineering 12, no. 12 (2024): 16–19. http://dx.doi.org/10.35940/ijese.h9629.12121124.

Full text
Abstract:
Network threat detection and modelling are critical aspects of network security in an organization since the many devices connecting to the internet can be vulnerable. Network attacks are unauthorized actions on the digital assets within an organizational network. Malicious parties usually execute network attacks to alter, destroy, or steal private data. Perpetrators in network attacks tend to target network perimeters to gain access to internal systems. In this project the incoming traffic and outgoing network traffic is analyzed and from the several devices in an organization and security de
APA, Harvard, Vancouver, ISO, and other styles
9

Potter, Bruce. "Microsoft SDL Threat Modelling Tool." Network Security 2009, no. 1 (2009): 15–18. http://dx.doi.org/10.1016/s1353-4858(09)70008-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mahendra, V. "Network Threat Detection and Modelling." International Journal of Emerging Science and Engineering (IJESE) 12, no. 12 (2024): 16–19. https://doi.org/10.35940/ijese.H9629.12121124.

Full text
Abstract:
<strong>Abstract:</strong> Network threat detection and modelling are critical aspects of network security in an organization since the many devices connecting to the internet can be vulnerable. Network attacks are unauthorized actions on the digital assets within an organizational network. Malicious parties usually execute network attacks to alter, destroy, or steal private data. Perpetrators in network attacks tend to target network perimeters to gain access to internal systems. In this project the incoming traffic and outgoing network traffic is analyzed and from the several devices in an o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Threat modelling"

1

Svensson, Carl. "Threat modelling of historical attacks with CySeMoL." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476.

Full text
Abstract:
This report investigates the modelling power of the Cyber Security Modelling Language, CySeMoL by looking at three documented cyber attacks and attempting to model the respective systems in which they occurred. By doing this, strengths and weaknesses of the model are investigated and proposals for improvements to the CySeMoL model are explored.<br>Denna rapport undersöker modellingsförmågan hos Cyber Security Modelling Language, CySeMoL genom att titta på tre dokumenterade IT-angrepp och försöka modellera systemen som respektive attack skedde i. Genom att göra detta undersöks styrkor och svagh
APA, Harvard, Vancouver, ISO, and other styles
2

Geng, Ningyao. "azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284501.

Full text
Abstract:
When assessing network systems, security has always been one of the priorities.Cyber threat modelling is one of the most suitable methods. From a startingpoint to each valuable asset, the simulation can enable the users to explore certainsecurity weaknesses alongside the attack path. In the end, the time to compromiseshows the security level of the whole system.In principle, most cyber threat models can be built and simulated by attack graphswhere each point in the graph can stand for a certain asset in the network system.However, different systems have different infrastructures and implementa
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Virdi Amandeep. "AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Full text
Abstract:
Attack simulations provide a viable means to test the cyber security of a system. The simulations trace the steps taken by the attacker to compromise sensitive assets within the system. In addition to this, they can also estimate the time taken by the attacker for the same, measuring from the initial step up to the final. One common approach to implement such simulations is the use of attack graph, which trace the various dependencies of every step and their connection to one another in a formal way. To further facilitate attack simulations and to reduce the effort of creating new attack graph
APA, Harvard, Vancouver, ISO, and other styles
4

Skobalj, Nedo. "Validating vehicleLang for Domain-specific Threat Modelling of In-vehicle Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249601.

Full text
Abstract:
Due to technological developments, vehicles have gone from mechanically controlled machines to software controlled, connected machines. Increased reliance on software to operate and wireless connections to external services have exposed vehicles to a new threat, cyber attacks. Because of this threat, development of new tools has been required to improve and ease the process of securing vehicles against attacks. One such tool is vehicleLang, a probabilistic threat modelling and attack simulation language specifically designed for the automotive domain. However, vehicleLang has been developed ba
APA, Harvard, Vancouver, ISO, and other styles
5

Jefford-Baker, Jonathan. "ALCOL : Probabilistic Threat Modelling of the Amazon Elastic Container Service Domain." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261421.

Full text
Abstract:
Cloud computing is becoming an increasingly popular computation model for IT-infrastructures which has changed the notion of computing resources. Another concept that has become popular is containers which provides the capability to run applications isolated from each other while sharing the host’s operating system kernel. These two concepts have been combined to run containerised environments in the cloud, a cloud service type which has become popular among customers. The increased deployment of IT-infrastructures built on cloud environments running containers results in an increased exposure
APA, Harvard, Vancouver, ISO, and other styles
6

Syed, Romilla. "DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3906.

Full text
Abstract:
This dissertation examines the identity threats perceived by individuals and organizations in Online Social Networks (OSNs). The research constitutes two major studies. Using the concepts of Value Focused Thinking and the related methodology of Multiple Objectives Decision Analysis, the first research study develops the qualitative and quantitative value models to explain the social identity threats perceived by individuals in Online Social Networks. The qualitative value model defines value hierarchy i.e. the fundamental objectives to prevent social identity threats and taxonomy of user respo
APA, Harvard, Vancouver, ISO, and other styles
7

Fagade, Tesleem. "A multi-domain approach for security compliance, insider threat modelling and risk management." Thesis, University of Bristol, 2018. http://hdl.handle.net/1983/c7461605-6493-4413-8835-65847df90a57.

Full text
Abstract:
Information security is fundamentally concerned with the confidentiality, integrity and availability of information assets at all times. However, given the ubiquitous nature of information systems and organisations’ growing reliance on large-scale interconnected networks;, it means that the prevalence and impact of cyber-attacks will continue to rise. The problem of cybersecurity risks management in corporate organisations is non-trivial, hence, constructing tools that truly satisfy the holistic management of information security is difficult and not readily available. The work described in th
APA, Harvard, Vancouver, ISO, and other styles
8

Greenwood, David. "Socio-technical analysis of system-of-systems using responsibility modelling." Thesis, University of St Andrews, 2012. http://hdl.handle.net/10023/3176.

Full text
Abstract:
Society is challenging systems engineers by demanding increasingly complex and integrated IT systems (Northrop et al., 2006; RAE, 2004) e.g. integrated enterprise resource planning systems, integrated healthcare systems and business critical services provisioned using cloud based resources. These types of IT system are often systems-of-systems (SoS). That is to say they are composed of multiple systems that are operated and managed by independent parties and are distributed across multiple organisational boundaries, geographies or legal jurisdictions (Maier, 1998). SoS are notorious for becomi
APA, Harvard, Vancouver, ISO, and other styles
9

van, der Schoot Willem. "Validating vehicleLang, a domain-specific threat modelling language, from an attacker and industry perspective." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284244.

Full text
Abstract:
Today’s vehicles are incredibly complex devices with vast networks of integratedelectronics and connectivity. This has led to improved safety, fuel efficiencyand comfort. However, with more electronics and connectivity comesan ever-increasing attack surface for adversaries to exploit. To help vehicle designersbetter understand the security risks and therefore reduce them, threatmodelling can be utilised. vehicleLang is a threat modelling language explicitlycreated for vehicles to model and simulate attacks to produce probabilisticattack graphs. An accompanying tool to vehicleLang called securi
APA, Harvard, Vancouver, ISO, and other styles
10

Godakanda, Menaka L. "Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2023. https://ro.ecu.edu.au/theses/2653.

Full text
Abstract:
Modern technology has proliferated into just about every aspect of life while improving the quality of life. For instance, IoT technology has significantly improved over traditional systems, providing easy life, time-saving, financial saving, and security aspects. However, security weaknesses associated with IoT technology can pose a significant threat to the human factor. For instance, smart doorbells can make household life easier, save time, save money, and provide surveillance security. Nevertheless, the security weaknesses in smart doorbells could be exposed to a criminal and pose a dange
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Threat modelling"

1

Tseloni, Andromachi. Modelling threats in England and Wales. University of Manchester, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Antonio, Moretti, ed. Volcanoes: Formation, eruptions, and modelling. Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khare, M. Modelling urban vehicle emissions. WIT Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

M, Kim Y., Shang H. M, and United States. National Aeronautics and Space Administration., eds. Turbulence modelling of flow fields in thrust chambers: Final technical report for the period June 10, 1991 through September 13, 1992. Research Institute, the University of Alabama in Huntsville, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

M, Kim Y., Shang H. M, and United States. National Aeronautics and Space Administration., eds. Turbulence modelling of flow fields in thrust chambers: Final technical report for the period June 10, 1991 through September 13, 1992. Research Institute, the University of Alabama in Huntsville, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Apollonio, Fabrizio I. Architettura in 3D: Modelli digitali per i sistemi cognitivi. B. Mondadori, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Magnenat-Thalmann, Nadia. Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings. Springer-Verlag Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Paolini, Priscilla. Metodi e tecniche integrate di rilevamento per la realizzazione di modelli virtuali dell'architettura della città. Gangemi, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International Conference on Recent Advances in 3-D Digital Imaging and Modeling (1997 Ottawa, Ont.). International Conference on Recent Advances in 3-D Digital Imaging and Modeling: Proceedings, May 12-15, 1997, Ottawa, Ontario, Canada. IEEE Computer Society Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jaworski, Barbara, Josef Rebenda, Reinhard Hochmuth, et al. Inquiry in University Mathematics Teaching and Learning. Masaryk University Press, 2021. http://dx.doi.org/10.5817/cz.muni.m210-9983-2021.

Full text
Abstract:
The book presents developmental outcomes from an EU Erasmus+ project involving eight partner universities in seven countries in Europe. Its focus is the development of mathematics teaching and learning at university level to enhance the learning of mathematics by university students. Its theoretical focus is inquiry-based teaching and learning. It bases all activity on a three-layer model of inquiry: (1) Inquiry in mathematics and in the learning of mathematics in lecture, tutorial, seminar or workshop, involving students and teachers; (2) Inquiry in mathematics teaching involving teachers exp
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Threat modelling"

1

Baker, Matthew. "Threat Modelling." In Secure Web Application Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8596-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seaman, Jim. "Cyber Threat Prediction and Modelling." In Artificial Intelligence and National Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06709-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baudains, Peter, and Alan Wilson. "Conflict Modelling: Spatial Interaction as Threat." In Global Dynamics. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118937464.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dong, Xun, John A. Clark, and Jeremy L. Jacob. "Threat Modelling in User Performed Authentication." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

LeClair, Beckett, and Kaniz Fatema. "Threat Modelling in Virtual Assistant Hub Devices." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-74443-3_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marchione, Elio, and Alan Wilson. "Spatial Interaction as Threat: Modelling Maritime Piracy." In Global Dynamics. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118937464.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

van Do, Thoai, Van Thuan Do, Niels Jacot, Bernardo Flores, Boning Feng, and Thanh van Do. "MITRE ATT and CK Threat Modelling Extensions for Mobile Threats." In Mobile Web and Intelligent Information Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-39764-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Albers, Wulf. "Two-Person Bargaining Between Threat and Fair Solution." In Modelling and Analysis in Arms Control. Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-82943-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fielder, Andrew. "Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games." In From Lambda Calculus to Cybersecurity Through Program Analysis. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41103-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Naik, Nitin, Paul Jenkins, Paul Grace, Dishita Naik, Shaligram Prajapat, and Jingping Song. "An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-74443-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threat modelling"

1

Goudarzi, Mohammad, Arash Shaghaghi, Simon Finn, Burkhard Stillerd, and Sanjay Jha. "Towards Threat Modelling of IoT Context-Sharing Platforms." In 2024 22nd International Symposium on Network Computing and Applications (NCA). IEEE, 2024. https://doi.org/10.1109/nca61908.2024.00025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weir, J., B. Shaw, K. Pizzolato-Heine, et al. "Fragment Characterisation & Threat Modelling - A Multinational Study to Re-Define & Represent the Fragment Threat." In Personal Armour Systems Symposium. Royal Military Academy (Belgium), 2025. https://doi.org/10.52202/078352-0054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chianese, Luca, Daniele Granata, Paolo Palmiero, and Massimiliano Rak. "Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sharma, Desh Deepak, and Atul Sarojwal. "Secure and Resilient Threat Modelling Strategy for Drone Delivery System." In 2024 IEEE Region 10 Symposium (TENSYMP). IEEE, 2024. http://dx.doi.org/10.1109/tensymp61132.2024.10752205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

P, Jonathan Paul, and Manoranjitham R. "Predictive Modelling for Network Threat Detection using Artificial Intelligence Techniques." In 2025 5th International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 2025. https://doi.org/10.1109/icpcsn65854.2025.11035811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baeté, Christophe, and Dr Olga Dolgikh. "Optimizing Pipeline AC Threat Assessments Using Computational Aided Engineering (CAE) Modelling." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19219.

Full text
Abstract:
Abstract AC threat assessments on pipelines are typically covered under various specifications, and best practices, such as NACE SP0177, EN 50443 and the INGAA FINAL Report No. 2015-04. The theories and philosophies are all based upon sound engineering and scientific principles but require a significant amount of Subject Matter Expert (SME) time. The more complex the collocations, the slower the process and/or the higher the costs. With complex and large networks, the asset owner is often overwhelmed. An advanced approach has been developed, tested, and implemented on more than 66,000 miles of
APA, Harvard, Vancouver, ISO, and other styles
7

Sunder, Giulio, Alberto Salvatore Colletto, Sara Raimondi, Cataldo Basile, Alessio Viticchié, and Alessandro Aliberti. "Enhancing OT Threat Modelling: An Effective Rule-Based Approach for Attack Graph Generation." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Southey, R. D., and F. P. Dawalibi. "Computer Modelling of AC Interference Problems for the Most Cost-Effective Solutions." In CORROSION 1998. NACE International, 1998. https://doi.org/10.5006/c1998-98564.

Full text
Abstract:
Abstract AC interference from high voltage power lines can constitute an electric shock hazard and a threat to equipment integrity during both normal operation conditions and fault conditions. Simplified analysis methods can lead to millions of dollars in excess expenses due directly to overdesign or resulting from the consequences of underdesign. This paper presents a cost-effective AC interference mitigation method, which is made possible by the power of presently existing computer software. The importance of the soil’s multilayer soil structure in determining the performance of mitigation s
APA, Harvard, Vancouver, ISO, and other styles
9

Leal, Armando Borjas, and Stephen F. Biagiotti. "Evolving Excavation Damage Modelling Predictions to a Data-Driven Approach." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19558.

Full text
Abstract:
Abstract The evolution of regulatory codes, standards, and practices has increased the need for risk modelling to become data-driven to support more informed decision making. One Call1 information is a source of regular insight into activities along the pipeline right of way that could influence excavation damage prediction algorithms. However, the treatment of One Call data related to threat impact is challenging. Advances in technology, analysis techniques, and quantity of data available and accessible now afford for data integration and the observation of meaningful outcomes regarding relev
APA, Harvard, Vancouver, ISO, and other styles
10

Haynes, Gerald J., Christophe Baeté, Tyson Manning, and Lance Barton. "Variances in Pipeline Ac Interference Computational Modeling." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-12985.

Full text
Abstract:
Abstract The AC interference between High Voltage AC (HVAC) power lines and pipelines has been modeled with various software programs, all of which have a variety of input data which creates various results and outputs. Important aspects such as the soil resistivity along the pipeline route can have a significant impact on the pipelines coating resistance. This in turn can affect both the computed AC voltages and more specifically the current densities, both of which can significantly affect personal safety and corrosion of the pipeline. The spacing of the soil resistivity measurements can hav
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threat modelling"

1

Faverjon, Céline, Angus Cameron, and Marco De Nardi. Modelling framework to quantify the risk of AMR exposure via food products - example of chicken and lettuce. Food Standards Agency, 2022. http://dx.doi.org/10.46756/sci.fsa.qum110.

Full text
Abstract:
Antimicrobial resistance (AMR) is a complex issue where microorganisms survive antimicrobial treatments, making such infections more difficult to treat. It is a global threat to public health. To increase the evidence base for AMR in the food chain, the FSA has funded several projects to collect data to monitor the trends, prevalence, emergence, spread and decline of AMR bacteria in a range of retail foods in the UK. However, this data and information from the wider literature was yet to be used to create tools to aid in the production of quantitative risk assessment to determine the risk to c
APA, Harvard, Vancouver, ISO, and other styles
2

Beers, Gregory W. Seadyn90 Modelling: Three Point Mooring of FLIP with Three Arrays. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada247729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ortiz, Michael. Three-Dimensional Modelling and Simulation of Ballistic Impact. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada393714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Joshi, G., G. S. Dangol, B. Bajracharya, M. S. R. Murthy, and S. Wesselman. A Manual on Participatory Three-Dimensional Modelling (P3DM). International Centre for Integrated Mountain Development (ICIMOD), 2016. http://dx.doi.org/10.53055/icimod.616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Joshi, G., G. S. Dangol, B. Bajracharya, M. S. R. Murthy, and S. Wesselman. A Manual on Participatory Three-Dimensional Modelling (P3DM). International Centre for Integrated Mountain Development (ICIMOD), 2016. http://dx.doi.org/10.53055/icimod.616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Attansio, Orazio, and Debbie Blair. Structural modelling in policymaking. Centre for Excellence and Development Impact and Learning (CEDIL), 2018. http://dx.doi.org/10.51744/cip9.

Full text
Abstract:
Structural modelling, that is the use of behavioural models to add a framework to the decision problem of an agent, is a useful yet underused tool in evaluation. This paper provides a general introduction to structural modelling, as well as an overview of other commonly used evaluation techniques in Economics and other social sciences. It then goes on to show with three key case studies, how structural models can be used to enrich the findings from randomised control trials. The case studies cover a wide range of policy questions: examining demand for health products in Kenya, incentivising te
APA, Harvard, Vancouver, ISO, and other styles
7

Broome, J. G3d: a three dimensional gravity modelling program for IBM-compatible microcomputers. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eaton, D. BMOD3D: a program for three-dimensional seismic modelling using the Born approximation. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/208674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ansari, S. M., E. M. Schetselaar, and J. A. Craven. Three-dimensional magnetotelluric modelling of the Lalor volcanogenic massive-sulfide deposit, Manitoba. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/328003.

Full text
Abstract:
Unconstrained magnetotelluric inversion commonly produces insufficient inherent resolution to image ore-system fluid pathways that were structurally thinned during post-emplacement tectonic activity. To improve the resolution in these complex environments, we synthesized the 3-D magnetotelluric (MT) response for geologically realistic models using a finite-element-based forward-modelling tool with unstructured meshes and applied it to the Lalor volcanogenic massive-sulfide deposit in the Snow Lake mining camp, Manitoba. This new tool is based on mapping interpolated or simulated resistivity va
APA, Harvard, Vancouver, ISO, and other styles
10

Carter, T. R., F. R. Brunton, J. K. Clark, et al. Three-dimensional geological modelling of the Paleozoic bedrock of southern Ontario: status update. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2020. http://dx.doi.org/10.4095/321080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!