Academic literature on the topic 'Threats to environment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threats to environment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threats to environment"
Yao, Min, and Min Zhao. "Unmanned aerial vehicle dynamic path planning in an uncertain environment." Robotica 33, no. 3 (2014): 611–21. http://dx.doi.org/10.1017/s0263574714000514.
Full textWang, Iris M., and Joshua M. Ackerman. "The Infectiousness of Crowds: Crowding Experiences Are Amplified by Pathogen Threats." Personality and Social Psychology Bulletin 45, no. 1 (2018): 120–32. http://dx.doi.org/10.1177/0146167218780735.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textD'yakonova, Iryna, Alina Nikitina, and Natalja Gurvits. "Improvement of the enterprise economic security management in global environment." Geopolitics under Globalization 2, no. 1 (2018): 19–26. http://dx.doi.org/10.21511/gg.02(1).2018.03.
Full textSmolders, A. J. P., E. C. H. E. T. Lucassen, and J. G. M. Roelofs. "The isoetid environment: biogeochemistry and threats." Aquatic Botany 73, no. 4 (2002): 325–50. http://dx.doi.org/10.1016/s0304-3770(02)00029-3.
Full textTsymbrivskyy, Taras. "Cyber threats and global business environment." Law Review 16, no. 2 (2017): 17–33. http://dx.doi.org/10.7220/2029-4239.16.2.
Full textTheron, Julien. "Networks of Threats: Interconnection, Interaction, Intermediation." Journal of Strategic Security 14, no. 3 (2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.
Full textJi, Wan Feng, Hai Feng Xu, Guang Yuan Wang, and Xiang Hong Yang. "Path Planning under Dynamic Threat Environment." Applied Mechanics and Materials 543-547 (March 2014): 1790–94. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1790.
Full textVidalis, Stilianos, Andy Jones, and Andrew Blyth. "Assessing cyber-threats in the information environment." Network Security 2004, no. 11 (2004): 10–16. http://dx.doi.org/10.1016/s1353-4858(04)00156-4.
Full textRowe, Paul. "VOIP - extra threats in the converged environment." Network Security 2005, no. 7 (2005): 12–16. http://dx.doi.org/10.1016/s1353-4858(05)70260-9.
Full textDissertations / Theses on the topic "Threats to environment"
Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Full textBlack, Brian C., Laura H. Bollock, Sinene Bouabid, et al. "Sea TENTACLE: Track, Engage, & Neutralize Threats - Asymmetric & Conventional - in the Littoral Environment." Thesis, Monterey, California : U.S. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/7275.
Full textCampos, Ana Paula da Silveira Serra. "Impacte ambiental do Desporto. Estudo de caso : Impacte ambiental de um evento de orientação - Portugal 'O' Meeting' 2001." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2001. http://dited.bn.pt:80/29481.
Full textChristiansen, Allen. "Modeling sensors and threats in a three-dimensional real-time simulation of a seaport environment." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/a_christiansen_042309.pdf.
Full textBrown, Jillian. "Bacterial community composition, TCE degradation, isotopic fractionation and toxicity of a TCE contaminated aquifer." Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources, 2009. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=33520.
Full textBergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.
Full textAndersson, Frida Maria. "Våld och hot om våld inom socialt arbete : - en studie om fem socialarbetares upplevelser och förståelse av våld och hot om våld från brukare." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-18049.
Full textStokes, Shereitte C. IV. "An analysis of the associations between chemical threats in the physical environment and human health outcomes in Soweto,South Africa." DigitalCommons@Robert W. Woodruff Library, Atlanta University Center, 2004. http://digitalcommons.auctr.edu/dissertations/1552.
Full textCedlund, Fia. "Hot och våld på jobbet : En studie om arbetsgivarens skyldighet att motverka hot och våld inom vård och omsorg." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78900.
Full textBerrisch, Georg Matthias. "The application of the concept of "common heritage of humankind" to the protection of the global environment : our response of public international law to global environmental threats." Thesis, McGill University, 1991. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=60445.
Full textBooks on the topic "Threats to environment"
Nordic Council of Ministers. Nordic Environment Report Group., ed. The Nordic environment: Present state, trends and threats. Nordic Council of Ministers, 1993.
Find full textname, No. Tactical nuclear weapons: Emergent threats in an evolving security environment. Brassey's Inc., 2003.
Find full textMeško, Gorazd, Dejana Dimitrijević, and Charles B. Fields, eds. Understanding and Managing Threats to the Environment in South Eastern Europe. Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0611-8.
Full textGerstein, Daniel M. Bioterror in the 21st century: Emerging threats in a new global environment. Naval Institute Press, 2009.
Find full textGerstein, Daniel M. Bioterror in the 21st century: Emerging threats in a new global environment. Naval Institute Press, 2009.
Find full textGerstein, Daniel M. Bioterror in the 21st century: Emerging threats in a new global environment. Naval Institute Press, 2009.
Find full text1949-, Kelly Mick, ed. Winds of change: Living in the global greenhouse. Headway, 1989.
Find full textKumpu, Ville. Ympäristö, politiikka ja julkisuus: Kolme tapaustutkimusta journalistisen julkisuuden rakentumisesta ja merkityksestä ympäristöpolitiikassa. Tampere University Press, 2020.
Find full textHolappa, Jarkko. Security threats and requirements for Java-based applications in the networked home environment. Technical Research Centre of Finland, 2001.
Find full textDefense: Protection against chemical, biological, radiological and nuclear threats in a changing security environment. Frankfurter Allgemeine Buch, 2012.
Find full textBook chapters on the topic "Threats to environment"
Kolomeets, Maxim, Ksenia Zhernova, and Andrey Chechulin. "Unmanned Transport Environment Threats." In Proceedings of 15th International Conference on Electromechanics and Robotics "Zavalishin's Readings". Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5580-0_32.
Full textMathieu, Charlotte, Pierre Potin, Josef Aschbacher, and Jérôme Lafeuille. "Environment." In Threats, Risks and Sustainability — Answers by Space. Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-87450-9_3.
Full textSenta, Tarcisio Della, and Jacob Park. "Global Threats and Opportunities." In World Forests, Society and Environment. Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4746-0_2.
Full textClark, Jonathan B. "Major Threats Within the Space Environment." In Handbook of Bioastronautics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-10152-1_91-1.
Full textIdahosa-Taylor, Ehi, and Samuel Collins. "CHAPTER 2. Chemical Regulation at the European Level: Safeguarding Consumer Health and Protecting the Environment." In Chemical Health Threats. Royal Society of Chemistry, 2018. http://dx.doi.org/10.1039/9781782623687-00024.
Full textTorosyan, G., and S. Harutyunyan. "Removing Chlorine-Containing Organic Compounds in the Environment After Floods." In Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5_28.
Full textGuan, Hui, Weiru Chen, Lin Liu, and Hongji Yang. "Environment-Driven Threats Elicitation for Web Applications." In Agent and Multi-Agent Systems: Technologies and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22000-5_31.
Full textTiwari, Ashish. "Modern Threats and Concerns of Environment Pollution." In Handbook of Environmental Materials Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-58538-3_191-1.
Full textBartoszcze, M., and J. Mierzejewski. "Some Problems Concerning Biological Threats." In Rapid Methods for Analysis of Biological Materials in the Environment. Springer Netherlands, 2000. http://dx.doi.org/10.1007/978-94-015-9534-6_1.
Full textKaffka, Alexander V. "Threats to Security: Environmental Degradation in the Former Soviet Union." In Conflict and the Environment. Springer Netherlands, 1997. http://dx.doi.org/10.1007/978-94-015-8947-5_11.
Full textConference papers on the topic "Threats to environment"
boukoftane, Abderrahmane. "Plant Threats management." In SPE International Conference on Health, Safety, and Environment in Oil and Gas Exploration and Production. Society of Petroleum Engineers, 2008. http://dx.doi.org/10.2118/111543-ms.
Full textAlnaim, Abdulrahman K., Ahmed M. Alwakeel, and Eduardo B. Fernandez. "Threats Against the Virtual Machine Environment of NFV." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769561.
Full textYoussef, Tarek A., Mohamad El Hariri, Nicole Bugay, and O. A. Mohammed. "IEC 61850: Technology standards and cyber-threats." In 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC). IEEE, 2016. http://dx.doi.org/10.1109/eeeic.2016.7555647.
Full textVishal, Bikrampal Kaur, and Surender Jangra. "Comparative Analysis of Security Threats in Mobile Cloud Computing Environment." In 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2018. http://dx.doi.org/10.1109/icrito.2018.8748761.
Full textSaadi, Chaimae, and Habiba Chaoui. "A new approach to mitigate security threats in cloud environment." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. ACM, 2017. http://dx.doi.org/10.1145/3018896.3018911.
Full textKolowrocki, K., and J. Soszynska-Budny. "Analysis of critical infrastructure operation process including operating environment threats." In 2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, 2016. http://dx.doi.org/10.1109/ieem.2016.7798168.
Full textHussain, S. M. Suhail, Taha Selim Ustun, and Akhtar Kalam. "Security threats and possible safeguard mechanisms under IEC 61850 environment." In 2020 International Conference on Smart Grids and Energy Systems (SGES). IEEE, 2020. http://dx.doi.org/10.1109/sges51519.2020.00142.
Full textManohar, Gautam, and Conrad Tucker. "A Privacy Preserving Data Mining Methodology for Dynamically Predicting Emerging Human Threats." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-13155.
Full textSirka, S., J. Erdelyi, P. Cicak, and K. Jelemenska. "Survey on Security Threats and Algorithms in Internet of Things Environment." In 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2019. http://dx.doi.org/10.1109/iceta48886.2019.9039994.
Full textBotheju, Deshai, and Kumuduni Abeysinghe. "Safety and Environment Management Under Cost Pressure: Threats, Challenges, and Solutions." In SPE International Conference and Exhibition on Health, Safety, Security, Environment, and Social Responsibility. Society of Petroleum Engineers, 2016. http://dx.doi.org/10.2118/179467-ms.
Full textReports on the topic "Threats to environment"
Duelley, Benjamin P. Defeating Asymmetric Threats in the Littoral Environment. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada525224.
Full textMelander, B. G., and W. W. Cooley. Atmospheric Electricity Hazards Threat Environment Definition. Defense Technical Information Center, 1985. http://dx.doi.org/10.21236/ada159739.
Full textCarlson, Jeffrey J. Vision-based threat detection in dynamic environments. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/913218.
Full textButts, David Joshua. Agent Based Modeling for Multi-threat Environments. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1477601.
Full textDEPARTMENT OF THE ARMY WASHINGTON DC. Force Health Protection (FHP): Occupational and Environmental Health (OEH) Threats. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada402362.
Full textPence, James B. Military Engineer Contribution to Operational Art: The Hybrid Threat Environment. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1001763.
Full textThomas, G. T. Flight Simulation Trainer Threat Environment Request for Proposal Requirements Report. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada246881.
Full textKirby, Samuel A. Ship-to-Objective Maneuver (STOM) in a Chinese Threat Environment. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada476521.
Full textSpoors, F., C. D. B. Leakey, and M. A. James. Coast to ocean: a Fife-eye view: ocean literacy in Fife, Scotland. Scottish Oceans Institute, 2021. http://dx.doi.org/10.15664/10023.23981.
Full textMichelletti, Lynn, Lynn H. Huntt, Steve Ashburnllbaum, and Steve A. Huntt. V-22 Operational Testing: Immersion of V-22 Aircraft into Simulated Threat Environment. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada368639.
Full text