نتایج جستجو برای: incident

تعداد نتایج: 47330  

Journal: :International Journal of Service Industry Management 2001

Background: On May 3, 2017, at 11:58 AM local time, an explosion occurred in the Zemestan-Yurt coal mine in Azadshahr City of Golestan Province, northern Iran, which resulted in mass casualty incident. Materials and Methods: In total, more than 126 miners were affected. Of them, 43 miners were killed, 73 other workers who helped their coworkers were also injured and taken to the hospital, and ...

Journal: :Security and Communication Networks 2022

The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in organizations follow predefined incident response (IR) procedure. However, this procedure is usually reactive, missing the opportunities foresee danger on horizon. Cyber threat intelligence (CTI) contains emerging attacks and should be ideally utilized inform IR current res...

An approximation technique is considered for computing transmission and reflection coefficients for propagation of an elastic pulse through a planar slab of finite width. The propagation of elastic pulse through a planar slab is derived from first principles using straightforward time-dependent method. The paper ends with calculations of enhancement factor for the elastic plane wave and it is s...

Journal: :International Journal of Information Management 2022

Recent industrial reports show an increased number of cybersecurity incidents, which inflict significant financial losses. Although organisations have been increasing their investments towards information security, incidents continue to occur. Most adopt traditional linear incident response (IR) frameworks prevent, detect, contain, eradicate and learn lessons from security incidents. However, d...

2016
Matthias Vallentin Vern Paxson Robin Sommer

Network forensics and incident response play a vital role in site operations, but for large networks can pose daunting difficulties to cope with the ever-growing volume of activity and resulting logs. On the one hand, logging sources can generate tens of thousands of events per second, which a system supporting comprehensive forensics must somehow continually ingest. On the other hand, operator...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید