Results 251 to 260 of about 2,984,231 (308)
Some of the next articles are maybe not open access.
2022
The threat of attacks using chemical, biological, radiological, or nuclear means (CBRN) describe some of the most extreme possible events in a scenario of conflict. This chapter focuses on chemical (C) threats, where chemical agents are intended to cause a toxic effect on human organisms and where our definition of toxicity excludes those related to ...
Hassard, J.F., Nieuwenhuizen, M.S.
openaire +2 more sources
The threat of attacks using chemical, biological, radiological, or nuclear means (CBRN) describe some of the most extreme possible events in a scenario of conflict. This chapter focuses on chemical (C) threats, where chemical agents are intended to cause a toxic effect on human organisms and where our definition of toxicity excludes those related to ...
Hassard, J.F., Nieuwenhuizen, M.S.
openaire +2 more sources
Threats, Counter-Threats, and Strategic Voting
Econometrica, 1976This paper seeks to prove that under a large class of group decision rules some sincere voting situations will be unstable because of strategic manipulation by single individuals. The concept of stability used is weaker than the stability concepts figuring in many earlier contributions in this area, insofar as under the concept used here any individual,
openaire +2 more sources
2019
This chapter develops models for the unified analysis of security vulnerabilities and safety hazards that constitute various forms of threats to security and safety. A unified view of threats leads to understand that these threats can come from design flaws and faults at many levels of abstraction: application, architecture, or device. A unified threat
Marilyn Wolf, Dimitrios Serpanos
openaire +1 more source
This chapter develops models for the unified analysis of security vulnerabilities and safety hazards that constitute various forms of threats to security and safety. A unified view of threats leads to understand that these threats can come from design flaws and faults at many levels of abstraction: application, architecture, or device. A unified threat
Marilyn Wolf, Dimitrios Serpanos
openaire +1 more source
Operations Research, 1987
Many conflicts, ranging from biblical strife to modern superpower confrontations, are significantly affected by the threat of retaliation. We analyze the policy of tit-for-tat in a Threat Game based on Chicken, in which each player can initially choose any level of preemption or non-cooperation.
Brams, Steven J., Kilgour, D. Marc
openaire +2 more sources
Many conflicts, ranging from biblical strife to modern superpower confrontations, are significantly affected by the threat of retaliation. We analyze the policy of tit-for-tat in a Threat Game based on Chicken, in which each player can initially choose any level of preemption or non-cooperation.
Brams, Steven J., Kilgour, D. Marc
openaire +2 more sources
Threat Assessment and Threat Management
2021This introductory chapter sets forth three foundations for threat assessment and management: the first foundation is the defining of basic concepts, such as threat assessment and threat management; the second foundation outlines the similarities and differences between threat assessment and violence risk assessment; and the third foundation is a ...
J. Reid Meloy +3 more
openaire +1 more source
2017
This chapter discusses dependability threads for modern integrated circuits that affect both their correct operation and performance. The text provides an overview of fault/error models adopted in methodologies for dependability assessment, analysis, and mitigation.
Bolchini, Cristiana +3 more
openaire +2 more sources
This chapter discusses dependability threads for modern integrated circuits that affect both their correct operation and performance. The text provides an overview of fault/error models adopted in methodologies for dependability assessment, analysis, and mitigation.
Bolchini, Cristiana +3 more
openaire +2 more sources
Are natural threats superior threats?
Evolution and Human Behavior, 2022Abstract Threat superiority effects describe the reaction time advantage for locating threatening objects in a visual search paradigm, compared to locating visually similar non-threatening objects. They are widely reported for threats of both natural (snakes and spiders) and man-made (guns and knives) origins.
openaire +1 more source
Surgical Clinics of North America, 2006
The use of chemical agents as military weapons has been recognized for many centuries but reached the most feared and publicized level during World War I. Considerable political effort has been exercised in the twentieth century to restrict military strategies with chemicals.
openaire +2 more sources
The use of chemical agents as military weapons has been recognized for many centuries but reached the most feared and publicized level during World War I. Considerable political effort has been exercised in the twentieth century to restrict military strategies with chemicals.
openaire +2 more sources
Stereotype threat as validity threat: The anxiety–sex–threat interaction
Intelligence, 2008Abstract Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance.
Ana R. Delgado, Gerardo Prieto
openaire +1 more source

