نتایج جستجو برای: airport security

تعداد نتایج: 184356  

2014
Michael A. McCarthy

Debates over America’s heavy reliance on employer-provided private pensions have understated the profound role organized labor played after World War II. Archival evidence from prominent unions and business associations suggests that the shift in organized labor’s strategy after the New Deal toward electoral activity helps explain critical interventions by Northern Democrats into the system of ...

2015
Martin Jung Axel B. Classen Florian Rudolph

Aim of this simulation case study is to analyze waiting times and throughput at the security checkpoint of an international medium sized airport. The simulations shall provide the airport operator with the ability to easily change main impact parameters of an airport security checkpoint e.g. to test new security procedures, a flightplan with more passengers and also to optimize the security ope...

Journal: :Proceedings of National Aviation University 2009

Journal: :The Proceedings of the Annual Convention of the Japanese Psychological Association 2010

Journal: :Network Science 2017
Matt V. Leduc Ruslan Momot

We study the incentives that agents have to invest in costly protection against cascading failures in networked systems. Applications include vaccination, computer security, and airport security. Agents are connected through a network and can fail either intrinsically or as a result of the failure of a subset of their neighbors. We characterize the equilibrium based on an agent’s failure probab...

Journal: :CoRR 2015
Harold Nikoue Aude Marzuoli John-Paul Clarke Eric Feron Jim Peters

Airports constitute some of the most complex systems enabling mobility in today’s society. The various components inside the airport system each have specific requirements and include numerous systems, processes and stakeholders. Stakeholders are comprised of government entities (security and customs), private bodies (airport owner, airlines) and customers (passengers and cargo). An airport det...

2003
Mass Soldal Lund Folker den Braber Ketil Stølen

Security assessments are costly and time consuming and cannot be carried out from scratch each time a system is updated or modified. This motivates the need for specific methodology addressing the maintenance of assessment results, in particular, and a componentoriented approach to security assessment in general. This paper presents such a methodology in the setting of model-based security asse...

2005
Stephan Riebach Erwin P. Rathgeb Birger Tödtmann

Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to properly define and dimension appropriate security architectures and policies for a network, the possible threats have to be identified and assessed both in terms of their impact on the resources to be protected and with res...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید