• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 432
  • 49
  • 43
  • 27
  • 23
  • 19
  • 8
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 778
  • 236
  • 168
  • 159
  • 154
  • 141
  • 131
  • 90
  • 83
  • 82
  • 81
  • 78
  • 76
  • 74
  • 72
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

NATO's response to the 11 September 2001 terrorism : lessons learned

Kouzmanov, Krassi 03 1900 (has links)
Approved for public release; distribution is unlimited / This thesis analyzes NATO's decisions and actions in response to the 11 September 2001 terrorist attacks against the United States and assesses the probable future role of the Alliance in combating international terrorism. In September-October 2001 the United States chose to lead a coalition against the Al Qaida terrorists and their supporters in Afghanistan instead of ceding the initiative to NATO. The necessity for rapid decisions and action, the military capabilities gap between the United States and the European allies, and the lessons of NATO's air campaign in the 1999 Kosovo crisis probably led the United States to make this choice. NATO's contributions to the campaign against terrorism have included sending Airborne Warning and Control Systems aircraft to the United States, deploying naval forces to the Eastern Mediterranean, and conducting preventive action against terrorist groups acting within or from the Balkans. NATO's responses to the 11 September attacks, the unconventional and asymmetric threat posed by international terrorism, and the distinct contributions that the military can make in combating terrorism support the main hypothesis examined in this study: that NATO may be unable to play more than specific limited roles in the fight against international terrorism. / Major, Bulgarian Army
32

The impact of the September 11, 2001 terrorist attacks on U.S.-China relations / Model of the United States CENTCOM joint targeting architecture

Epstein, Daren Adam 03 1900 (has links)
Approved for public release; distribution unlimited / The terrorist attacks of September 11, 2001 on the United States had minimal impact on U.S.-China relations. The attacks merely rearranged U.S. strategic priorities in Asia while having no effect on Chinese strategic priorities. Before September 11, U.S. strategic priorities in Asia were U.S.-China relations, and containing North Korean aggression and its development of Weapons of Mass Destruction (WMD). After September 11, U.S. strategic priorities in Asia became the U.S. war on terror (WOT), containing North Korean Aggression and its development of WMD, and U.S.-China relations. This reordering of priorities did not result from stabilizing U.S.-China relations, but rather because of the increased threat of international terrorism towards the United States and U.S. interests. The Chinese strategic priorities of regime stability, territorial integrity, and increasing international prestige and power, did not change because of the attacks. The change in U.S. strategic priorities in Asia made the U.S.-China relationship more stable. Going forward, the PRC is likely to favor stable relations with the United States as long as China does not consider the expanding United States presence in Asia, because of the U.S. WOT, an immediate threat to Chinese strategic priorities. / Major, United States Army
33

Living with facial disability: The experiences of female survivors of acid attack in Pakistan

Gulrez, Huma 16 April 2016 (has links)
This study aimed to highlight the experiences, struggles and challenges of those women who have experienced facial disability due to acid violence in Pakistan. It addressed the issues in terms of knowing the actual reasons behind acid violence, the role of patriarchal culture and how these women perceive themselves after the incident. Using a qualitative research design, nine in-depth interviews were conducted with women with facial disability. All of them were working in the profession of beauty. They were recruited with the help of one non-profit organization named “Depilex Smileagain Foundation” (DSF). The social/cultural context of disability in Pakistani society was examined from the perspectives of the participants to gain insider knowledge. The participants identified the role of Pakistani society/culture in their lives as negative and discouraging especially in relation to marriage, employability and seeking justice; whereas the role of DSF was strongly supported and appreciated by participants in bringing back their lost confidence post-attack. They shared their experiences which are thought provoking for policy makers, government agencies as well as for other readers in order to understand the continuous powerful societal pressure on the minds of women with facial disability. / May 2016
34

Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable Medical Systems

Cai, Hang 06 August 2018 (has links)
Recent years have seen the dramatic increase of wearable medical systems (WMS) that have demonstrated promise for improving health monitoring and overall well-being. Ensuring that the data collected are secure and trustworthy is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on WMS, which aim to manipulate the sensor measurements with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the user’s health. Given that there are different possible vulnerabilities found in WMS that can lead to data manipulation attacks, we take a different angle by developing an attack-agnostic approach, called Signal Interrelationship CApture for Physiological-process (SICAP), to detect data manipulation attacks on physiological sensor measurements in a WMS. SICAP approach leverages the idea that different physiological signals in the user’s body driven by the same underlying physiological process (e.g., cardiac process) are inherently related to each other. By capturing the interrelationship patterns between the related physiological signals, it can detect if any signal is maliciously altered. This is because the incorrect user data introduced by adversaries will have interrelationship patterns that are uncharacteris- tic of the individual’s physiological process and hence quite different from the ones SICAP expects. We demonstrate the efficacy of our approach in detecting data manipulation attacks by building different detection solutions for two commonly measured physiological sensor measurements in a WMS environment – electrocardiogram and arterial blood pressure. The advantage of using this approach is that it allows for detection of data manipulation attacks by taking advantage of different types of physiological sensors, which already exist in typical WMS, thus avoiding the need of redundant sensors of the same type. Furthermore, SICAP approach is not designed to be stand-alone but provides the last line of defense for WMS. It is complementary to, and coexist with, any existing or future security solutions that may be introduced to protect WMS against data manipulation attacks.
35

Structure Attacks in Cryptographic Protocols

Mahlburg, Karl 01 May 2001 (has links)
Cryptographic protocols are in general difficult to analyze, and complicated attacks exposing security flaws have remained hidden years after a protocol is developed. Recently developed tools such as strand spaces and inductive logical proofs provide mechanical procedures for analyzing protocols. The key to these methods is that a generous upper bound on the activity of a malicious penetrator is often much easier to work with than a tighter bound. However, these formalizations make strong assumptions about the algebraic structure of the cryptosystem that are never met in a real application. In this work, we show that an extended form of the strand space machinery can be used to analyze protocols which contain nontrivial algebraic structure, specifically that which arises from the XOR operation. This work also serves as one of the first steps in reconciling computational and formal methods of analyzing cryptographic security.
36

Music, publics, and protest the cultivation of democratic nationalism in post-9/11 America /

Foster, Lisa Renee, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
37

Privilege and 9/11 risk perception, terrorist acts and the White male effect /

Torres, Manuel Roberto. January 2006 (has links)
Thesis (M.A.)--University of Delaware, 2006. / Principal faculty advisor: Benigno E. Aguirre, Dept. of Sociology. Includes bibliographical references.
38

Post-9/11 experiences of Muslim students in Florida public schools

Garman, Arifa Mohammad Bushier. January 2007 (has links)
Thesis (Ed. D.)--University of West Florida, 2007. / Title from title page of source document. Document formatted into pages; contains 167 pages. Includes bibliographical references.
39

The perceived effects of September 11, 2001 on student career choices

Olk, Erin E. January 2003 (has links) (PDF)
Thesis--PlanB (M.S.)--University of Wisconsin--Stout, 2003. / Includes bibliographical references.
40

The economic impact in the U.S. hotel industry after the terrorist attacks on September 11, 2001

Lin, Yuan-Chih. January 2003 (has links) (PDF)
Thesis--PlanB (M.S.)--University of Wisconsin--Stout, 2003. / Includes bibliographical references.

Page generated in 0.0433 seconds