Search for dissertations about: "Threat intelligence"
Showing result 1 - 5 of 12 swedish dissertations containing the words Threat intelligence.
-
1. Military intelligence analysis : institutional influence
Abstract : Intelligence is vital for the outcome of battles. As long as humans wage war, there will be a need for decision support to military and civilian leaders regarding adversaries or potential adversaries. However, the production of intelligence is neither easy nor without pitfalls. READ MORE
-
2. Interviewing to assess and manage threats of violence
Abstract : Persons who pose threats of violence can be rich sources of information for professionals charged with ensuring safety and security. The interviewing of threateners is thus considered important among such professionals, but research on the topic is scarce. READ MORE
-
3. Route attribution of chemical warfare agents : Retrospective classification of unknown threat samples
Abstract : Although chemical warfare agents (CWAs) are prohibited under international law, there have been numerous crimes that violates the 1997 Chemical Weapons Convention (CWC) during the last decade, especially in the civil war in Syria where sarin, mustard gas and chlorine have all been used. CWAs have also been used in political assassinations and attempts thereof. READ MORE
-
4. Handling severe uncertainty in strategic project appraisal : Methods and applications of context analysis
Abstract : The long-term success or failure of a strategic project is largely shaped by its context. Therefore, the assessment of the external factors influencing the fulfilment of project long-term goals is vital for the effective project appraisal and planning. READ MORE
-
5. Robust and Efficient Federated Learning for IoT Security
Abstract : The widespread adoption of Internet of Things (IoT) devices has led to substantial progress across various industrial sectors, including healthcare, transportation, and manufacturing. However, these devices also introduce significant security vulnerabilities because they are often deployed without adequate security measures, making them susceptible to cyber threats. READ MORE