• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 185
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 471
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Die widerrechtlichen Drohungen : in geschichtlicher Entwicklung dargestellt /

Berger, Ernst. January 1906 (has links)
Thesis (doctoral)--Universität Breslau.
2

Zur Lehre von der Erpressung : insbesondere durch Drohung mit an sich nicht strafbaren Handlungen /

Glasshoff, Wilhelm. January 1896 (has links)
Thesis (doctoral)--Universität Göttingen.
3

Das Problem der Erpressung mittels Drohung /

Beckmann, Otto. January 1930 (has links)
Thesis (doctoral)--Philipp-Universität zu Marburg.
4

Track spacing for an Archimedes spiral search by a maritime patrol aircraft (MPA) in Anti-Submarine Warfare (ASW) operations

Son, Byungsoo 12 1900 (has links)
The military threat of hostile submarines is increasing and the need for effective Anti-Submarine Warfare (ASW) operations is also increasing. In response, the ROK government and military have improved their ASW capabilities. In this thesis, the recommended track spacing for an Archimedes spiral search in a datum search problem was studied. To find a recommended track spacing, three analytical approaches were explored. Each of three analytical approaches has its own strengths and weaknesses. This analysis combined three analytical functions into a single parameterized expression. To find the best-fit parameters maximizing probability of detection, a simulation experiment with a NOLH (Nearly Orthogonal Latin Hypercube) design was used. / Korean Army author.
5

Deterring terrorism a framework for making retaliatory threats credible /

Tippet, Douglas F. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Knopf, Jeffrey W. Second Reader: Davis, Zachary S. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Deterrence, Terrorist attack, Non-state actor, Retaliation, Retribution, Punitive deterrence, Deterring terrorism, Reprisal, Nuclear terrorism, Cyber terrorism, Terrorist vunerabilities, Terrorism. Includes bibliographical references (p. 87-91). Also available in print.
6

Security perception : within and beyond the traditional approach /

Malec, Mieczyslaw. January 2003 (has links) (PDF)
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Jeffrey Knopf, Boris Keyser. Includes bibliographical references (p. 69-73). Also available online.
7

Key establishment for wireless sensor networks using third parties

Almowuena, Saleh 18 October 2011 (has links)
Wireless sensor networks are employed in a wide range of applications including disaster relief operations, forest-fire detection, battlefield surveillance, pollution measurement, and healthcare applications. Because of the characteristics of these applications, a wireless sensor network is more vulnerable to security threats than traditional networks. In order to protect the sensor network from outside attacks, it is necessary to implement a cryptographic mechanism that can achieve three major security objectives: confidentiality, integrity and authentication. Even though the topic of cryptography has been well studied for traditional networks, many conventional cryptographic approaches cannot easily be applied to sensor networks. To illustrate, public key-based schemes and even some symmetric key methods are complex with regards to computations, memory, communication, and packet size requirements. On the other hand, sensor networks suffer from severe constraints on their available resources as a result of the necessity to increase the lifetime of the complete network, minimize the physical size of the sensor nodes, and reduce the cost of sensor nodes. Consequently, it is important to propose cryptographic solutions designed specifically for wireless sensor networks. A fundamental element in an effective cryptographic system is how sensor nodes are equipped with the cryptographic keys needed to create secure radio connections with their local neighbours. This thesis contributes to the challenging field of key establishment by introducing three key agreement schemes whose memory, processing, and communication requirements are low. These methods utilize the concept of third parties, and sometimes also deployment knowledge, to reduce the cryptographic burden of public-key based schemes and the key management overhead of symmetric key approaches. The proposed methods employ just a few simple hash operations in the sensor nodes. Furthermore, additional nodes called third parties are deployed to assist sensor nodes in the key establishment phase. Our key agreement schemes have many advantages over existing approaches. For instance, a sensor node in these schemes needs to make just a few local contacts to establish a secure radio connection with its neighbours with very high probability. In addition, the majority of sensor nodes must store only a small number of secret keys in their memory. These methods also employ an authentication mechanism to prevent impersonation attacks. / Graduate
8

Responding to the threat from Third World air defense systems comparison of U.S. policy options /

Ackermann, Glen Charles. January 1990 (has links)
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 1990. / Thesis Advisor(s): Laurence, Edward J. Second Reader: Teti, Frank M. "December 2009." Description based on title screen as viewed on March 28, 2010. DTIC Descriptor(s): Air defense, strategic warfare, deterrence, nuclear proliferation, military forces (United States), developing nations, military strategy, navy, theses, regions, response, antiaircraft weapons, missions, marine transportation, arms control, power, water, weapons DTIC Identifier(s): Naval operations, proliferation(weapons), jet fighters, surface to air missiles, international trade, threats, foreign military sales, export, policies, Caribbean Sea, Japan Sea, Arabian Sea Author(s) subject terms: Air defense weapons; Third World; national interest Includes bibliographical references (p. 96-99). Also available in print.
9

Experimental analysis of threat-based persuasive appeals

Wuebben, Paul Lane, January 1966 (has links)
Thesis (Ph. D.)--University of Wisconsin--Madison, 1966. / Typescript. Vita. Includes bibliographical references.
10

The sky is not falling regional reaction to a nuclear-armed Iran

Madson, Peter N. 03 1900 (has links)
Recent case studies suggest that states highly motivated to obtain nuclear weapons will eventually succeed. If Iran manages to go nuclear, as Israel, India, Pakistan, and North Korea have done, what will the Arabian Gulf region look like after Tehran acquires these weapons? This thesis investigates the likely responses of Israel, the Arab Gulf States, and Pakistan to an Iran armed with nuclear weapons. A detailed examination of regional statements and media analysis shows that the region will likely not be further unbalanced. Instead, these states will pursue rational responses to diminish any Iranian threats. This thesis argues that Israel will develop a mutually deterring relationship with Tehran. The Arab Gulf States will not yield to the temptation to develop domestic nuclear programs-instead they will continue to outsource state security needs. Pakistan, focused on India and lacking serious issues with Iran, will create an understanding to avoid conflict. Iranian nuclear weapon acquisition will be universally unwelcome, but the United States can mitigate the negative impact by extending security guarantees to states requiring protection against a potentially more aggressive nuclear Iran.

Page generated in 0.0676 seconds