2,484 results on '"Lagerström, A."'
Search Results
52. Ethical Principles for Designing Responsible Offensive Cyber Security Training.
53. Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study.
54. Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
55. Evaluating the Impact of Inter Process Communication in Microservice Architectures.
56. An Attack Simulation Language for the IT Domain.
57. Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept
58. An Attack Simulation Language for the IT Domain
59. A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain
60. The theoretical evolution and use of the Uppsala Model of internationalization in the international business ecosystem
61. Headquarters–subsidiary interaction during the introduction of a value product in India
62. School attendance problems in adolescent with attention deficit hyperactivity disorder
63. Back to the surface – Daylighting urban streams in a Global North–South comparison
64. Refining a subsidiary evolution framework: clarifying key concepts
65. Environmental risk assessment of using antifouling paints on pleasure crafts in European Union waters
66. Quantification of Cu and Zn in antifouling paint films by XRF
67. Bedömning av algebraiskt tänkande : Lärares samtal om att synliggöra algebraiskt tänkande
68. Institutional amnesia during large crisis: Effects of poor documentation
69. Probiotic supplementation and risk of necrotizing enterocolitis and mortality among extremely preterm infants - the Probiotics in Extreme Prematurity in Scandinavia (PEPS) trial : study protocol for a multicenter, double-blinded, placebo-controlled, and registry-based randomized controlled trial
70. Does herbivory change the chemical and organoleptic properties in vegetables?
71. A Method for Assigning Probability Distributions in Attack Simulation Languages
72. Using evidence-based applied positive psychology to promote student well-being.
73. A Study of Security Vulnerabilities and Software Weaknesses in Vehicles.
74. Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases.
75. Re-using Enterprise Architecture Repositories for Agile Threat Modeling.
76. Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications.
77. Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang.
78. Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook.
79. Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept.
80. Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language.
81. Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD.
82. Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD
83. A Study of Security Vulnerabilities and Software Weaknesses in Vehicles
84. Targeting barrel field spiny stellate cells using a vesicular monoaminergic transporter 2-Cre mouse line
85. The evolution of MNCs' R&D foreign units: the case of Swedish MNCs in India
86. “Wag the Dog” initiatives and the corporate immune system
87. Antifouling paints leach copper in excess – study of metal release rates and efficacy along a salinity gradient
88. Design and rationale of FLAVOUR: A phase IIa efficacy study of the 5-lipoxygenase activating protein antagonist AZD5718 in patients with recent myocardial infarction
89. Understanding a demerger process: The divorce metaphor
90. Neural ensembles that encode affective mechanical and heat pain in mouse spinal cord
91. Cooperating while competing in multinational corporations
92. Competition unbundled: taking stock and looking forward
93. Association of the OPRM1 Variant rs1799971 (A118G) with Non-Specific Liability to Substance Dependence in a Collaborative de novo Meta-Analysis of European-Ancestry Cohorts
94. Automating threat modeling using an ontology framework
95. Model for leisure boat activities and emissions – implementation for the Baltic Sea
96. Synthetic mRNA Encoding VEGF-A in Patients Undergoing Coronary Artery Bypass Grafting: Design of a Phase 2a Clinical Trial
97. Mouse connective tissue mast cell proteases tryptase and carboxypeptidase A3 play protective roles in itch induced by endothelin-1
98. Targeting barrel field spiny stellate cells using a vesicular monoaminergic transporter 2-Cre mouse line
99. Does proactivity matter? the importance of initiative selling tactics for headquarters acceptance of subsidiary initiatives
100. Neuropeptide Y in itch regulation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.