Journal articles on the topic 'Threats to environment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threats to environment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yao, Min, and Min Zhao. "Unmanned aerial vehicle dynamic path planning in an uncertain environment." Robotica 33, no. 3 (2014): 611–21. http://dx.doi.org/10.1017/s0263574714000514.
Full textWang, Iris M., and Joshua M. Ackerman. "The Infectiousness of Crowds: Crowding Experiences Are Amplified by Pathogen Threats." Personality and Social Psychology Bulletin 45, no. 1 (2018): 120–32. http://dx.doi.org/10.1177/0146167218780735.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textD'yakonova, Iryna, Alina Nikitina, and Natalja Gurvits. "Improvement of the enterprise economic security management in global environment." Geopolitics under Globalization 2, no. 1 (2018): 19–26. http://dx.doi.org/10.21511/gg.02(1).2018.03.
Full textSmolders, A. J. P., E. C. H. E. T. Lucassen, and J. G. M. Roelofs. "The isoetid environment: biogeochemistry and threats." Aquatic Botany 73, no. 4 (2002): 325–50. http://dx.doi.org/10.1016/s0304-3770(02)00029-3.
Full textTsymbrivskyy, Taras. "Cyber threats and global business environment." Law Review 16, no. 2 (2017): 17–33. http://dx.doi.org/10.7220/2029-4239.16.2.
Full textTheron, Julien. "Networks of Threats: Interconnection, Interaction, Intermediation." Journal of Strategic Security 14, no. 3 (2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.
Full textJi, Wan Feng, Hai Feng Xu, Guang Yuan Wang, and Xiang Hong Yang. "Path Planning under Dynamic Threat Environment." Applied Mechanics and Materials 543-547 (March 2014): 1790–94. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1790.
Full textVidalis, Stilianos, Andy Jones, and Andrew Blyth. "Assessing cyber-threats in the information environment." Network Security 2004, no. 11 (2004): 10–16. http://dx.doi.org/10.1016/s1353-4858(04)00156-4.
Full textRowe, Paul. "VOIP - extra threats in the converged environment." Network Security 2005, no. 7 (2005): 12–16. http://dx.doi.org/10.1016/s1353-4858(05)70260-9.
Full textParn, Erika A., and David Edwards. "Cyber threats confronting the digital built environment." Engineering, Construction and Architectural Management 26, no. 2 (2019): 245–66. http://dx.doi.org/10.1108/ecam-03-2018-0101.
Full textSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Full textVLASOV, Maksim V., Ol'ga N. BUCHINSKAYA, and Vasilii V. SUKHIKH. "Digital environment of trust." Economic Analysis: Theory and Practice 20, no. 7 (2021): 1343–67. http://dx.doi.org/10.24891/ea.20.7.1343.
Full textFlieger, Jolanta, and Michał Flieger. "Ionic Liquids Toxicity—Benefits and Threats." International Journal of Molecular Sciences 21, no. 17 (2020): 6267. http://dx.doi.org/10.3390/ijms21176267.
Full textPywell, M. "A question of survival – military aircraft vs the electromagnetic environment." Aeronautical Journal 108, no. 1087 (2004): 453–64. http://dx.doi.org/10.1017/s0001924000000270.
Full textPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Full textPardue, Harold, Jeffrey P. Landry, and Alec Yasinsac. "E-Voting Risk Assessment." International Journal of Information Security and Privacy 5, no. 3 (2011): 19–35. http://dx.doi.org/10.4018/jisp.2011070102.
Full textSharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (2021): 1849. http://dx.doi.org/10.3390/electronics10151849.
Full textUstyuzhanina, Elena V., and Sergey G. Evsukov. "DIGITALIZATION OF THE EDUCATIONAL ENVIRONMENT: OPPORTUNITIES AND THREATS." Vestnik of the Plekhanov Russian University of Economics, no. 1 (February 12, 2018): 3–12. http://dx.doi.org/10.21686/2413-2829-2018-1-3-12.
Full textDurbin, Steve. "Tackling converged threats: building a security-positive environment." Network Security 2011, no. 6 (2011): 5–8. http://dx.doi.org/10.1016/s1353-4858(11)70061-7.
Full textSlavkovic, Rade, and Dejan Krsljanin. "Impact of the operational environment on cyber threats." Vojno delo 67, no. 5 (2015): 333–56. http://dx.doi.org/10.5937/vojdelo1505333s.
Full textHan, Jung-Soo. "Security Threats in the Mobile Cloud Service Environment." Journal of Digital Convergence 12, no. 5 (2014): 263–69. http://dx.doi.org/10.14400/jdc.2014.12.5.263.
Full textKislyakov, Pavel Aleksandrovich, and Olga Aleksandrovna Silaeva. "THREATS OF SOCIAL SAFETY OF THE EDUCATION ENVIRONMENT." V mire nauchnykh otkrytiy, no. 9.4 (December 22, 2014): 1460. http://dx.doi.org/10.12731/wsd-2014-9.4-13.
Full textBöse-O’Reilly, Stephan, Ursel Heudorf, Thomas Lob-Corzilius, Karl Ernst v. Mühlendahl, Matthias Otto, and Sabine Schmidt. "Children's environment in Central Europe: Threats and chances." International Journal of Hygiene and Environmental Health 210, no. 5 (2007): 503–7. http://dx.doi.org/10.1016/j.ijheh.2007.07.010.
Full textPereira, Paulo, Damià Barceló, and Panos Panagos. "Soil and water threats in a changing environment." Environmental Research 186 (July 2020): 109501. http://dx.doi.org/10.1016/j.envres.2020.109501.
Full textKo, Eunhye, Taeeun Kim, and Hwankuk Kim. "Management platform of threats information in IoT environment." Journal of Ambient Intelligence and Humanized Computing 9, no. 4 (2017): 1167–76. http://dx.doi.org/10.1007/s12652-017-0581-6.
Full textSchreurs, Miranda A. "Global Environment Threats and a Divided Northern Community." International Environmental Agreements: Politics, Law and Economics 5, no. 3 (2005): 349–76. http://dx.doi.org/10.1007/s10784-005-3809-4.
Full textNaseem, Afshan, and Yasir Ahmad. "Critical Success Factors for Neutralization of Airborne Threats." SAGE Open 10, no. 3 (2020): 215824402096306. http://dx.doi.org/10.1177/2158244020963066.
Full textHan, Ooi Wei, Shahrizal Ide Moslin, and Wan Aminullah. "GNSS Interference Environment in Malaysia: A Case Study." Journal of Engineering Technology and Applied Physics 3, no. 1 (2021): 13–16. http://dx.doi.org/10.33093/jetap.2021.3.1.3.
Full textVimalRosy, J., and S. Britto Ramesh Kumar. "Security Threats in Cloud Computing." Asian Journal of Computer Science and Technology 8, S1 (2019): 80–83. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1946.
Full textUskov, Vladislav, and Irina Reshetnikova. "Problems of the model of managing the integrated risk assessment for humans and environment in construction activities." MATEC Web of Conferences 265 (2019): 07003. http://dx.doi.org/10.1051/matecconf/201926507003.
Full textБуров, Олександр, Олександр Бутнік-Сіверський, Олена Орлюк, and Катерина Горська. "CYBERSECURITY AND INNOVATIVE DIGITAL EDUCATIONAL ENVIRONMENT." Information Technologies and Learning Tools 80, no. 6 (2020): 414–30. http://dx.doi.org/10.33407/itlt.v80i6.4159.
Full textBagheri, Zahra M., Callum G. Donohue, and Jan M. Hemmi. "Evidence of predictive selective attention in fiddler crabs during escape in the natural environment." Journal of Experimental Biology 223, no. 21 (2020): jeb234963. http://dx.doi.org/10.1242/jeb.234963.
Full textHamad, Mohammad, and Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study." Information 11, no. 5 (2020): 273. http://dx.doi.org/10.3390/info11050273.
Full textAljammal, Ashraf Hamdan, Hani Bani-Salameh, Ayoub Alsarhan, Mohammad Kharabsheh, and Mamoon Obiedat. "Node Verification to Join the Cloud Environment Using Third Party Verification Server." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 4 (2017): 55. http://dx.doi.org/10.3991/ijim.v11i4.6501.
Full textZhang, Zhe, Jian Wu, Jiyang Dai, and Cheng He. "Rapid Penetration Path Planning Method for Stealth UAV in Complex Environment with BB Threats." International Journal of Aerospace Engineering 2020 (August 1, 2020): 1–15. http://dx.doi.org/10.1155/2020/8896357.
Full textRodin, Y. S., and I. P. Sinitsyn. "Security basic model for applied tasks of the distributed information system." PROBLEMS IN PROGRAMMING, no. 2 (June 2021): 016–23. http://dx.doi.org/10.15407/pp2021.02.016.
Full textVoskanyan, Y. E. "Modern principles of management of patient safety (systematic review)." Sechenov Medical Journal, no. 3 (September 30, 2018): 17–24. http://dx.doi.org/10.47093/2218-7332_2018.3.17-24.
Full textEl-Khouly, Mahmoud M., and Samir Abou El-Seoud. "Malware Detection in Cloud Environment (MDCE)." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 139. http://dx.doi.org/10.3991/ijim.v11i2.6575.
Full textLiudmila, Baeva. "Ethical Threats and Existential Safety." Social Inquiry: Journal of Social Science Research 2, no. 2 (2020): 103–15. http://dx.doi.org/10.3126/sijssr.v2i2.33056.
Full textKearney, Stephen G., Josie Carwardine, April E. Reside, et al. "The threats to Australia’s imperilled species and implications for a national conservation response." Pacific Conservation Biology 25, no. 3 (2019): 231. http://dx.doi.org/10.1071/pc18024.
Full textvan Stralen, Daved, and Thomas Mercer. "Pandemic COVID-19, the High-Reliability Organization (HRO), and the Ecology of Fear." Neonatology Today 15, no. 12 (2020): 129–38. http://dx.doi.org/10.51362/neonatology.today/2020121512129138.
Full textHong, Mi Hwa, and Nam Kyu Kim. "How do external territorial threats affect mass killing?" Journal of Peace Research 56, no. 4 (2019): 529–44. http://dx.doi.org/10.1177/0022343318821707.
Full textGong, Seonghyeon, and Changhoon Lee. "Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform." Electronics 10, no. 3 (2021): 239. http://dx.doi.org/10.3390/electronics10030239.
Full textKim, Nam Kyu. "External Territorial Threats and Military Regimes." Political Research Quarterly 72, no. 4 (2018): 863–77. http://dx.doi.org/10.1177/1065912918812743.
Full textBolourchi, Mostafa, and Maryam Bolourchi. "Interaction between Fluid Urban Spaces and Reduction of Vulnerability to Risks and Threats in Urban Crises." Journal of Sustainable Development 10, no. 2 (2017): 143. http://dx.doi.org/10.5539/jsd.v10n2p143.
Full textMrozowska, Alicja. "CATALOG OF NON-MILITARY RISKS OCCURRING IN MARINE AREAS, WITH SPECIAL CONSIDERATION FOR THREATS GENERATED BY NATURAL CONDITIONS." Rocznik Bezpieczeństwa Morskiego XIV (November 2, 2020): 1–2. http://dx.doi.org/10.5604/01.3001.0014.6070.
Full textHenderson, David, Michael Lapke, and Christopher Garcia. "SQL Injection: A Demonstration and Implications for Accounting Students." AIS Educator Journal 11, no. 1 (2016): 1–8. http://dx.doi.org/10.3194/1935-8156-11.1.1.
Full textBurkhardt, Helmut. "Human Footprint on the Global Environment: Threats to Sustainability." Canadian Studies in Population 40, no. 1-2 (2013): 103. http://dx.doi.org/10.25336/p6qc8b.
Full textAl-Damkhi, Ali Mohamed, and Rana Abdullah Al-Fares. "Terrorist Threats to the Environment in Iraq and Beyond." Global Environmental Politics 10, no. 1 (2010): 1–6. http://dx.doi.org/10.1162/glep.2010.10.1.1.
Full text