نتایج جستجو برای: airport security
تعداد نتایج: 184356 فیلتر نتایج به سال:
Debates over America’s heavy reliance on employer-provided private pensions have understated the profound role organized labor played after World War II. Archival evidence from prominent unions and business associations suggests that the shift in organized labor’s strategy after the New Deal toward electoral activity helps explain critical interventions by Northern Democrats into the system of ...
Aim of this simulation case study is to analyze waiting times and throughput at the security checkpoint of an international medium sized airport. The simulations shall provide the airport operator with the ability to easily change main impact parameters of an airport security checkpoint e.g. to test new security procedures, a flightplan with more passengers and also to optimize the security ope...
We study the incentives that agents have to invest in costly protection against cascading failures in networked systems. Applications include vaccination, computer security, and airport security. Agents are connected through a network and can fail either intrinsically or as a result of the failure of a subset of their neighbors. We characterize the equilibrium based on an agent’s failure probab...
Airports constitute some of the most complex systems enabling mobility in today’s society. The various components inside the airport system each have specific requirements and include numerous systems, processes and stakeholders. Stakeholders are comprised of government entities (security and customs), private bodies (airport owner, airlines) and customers (passengers and cargo). An airport det...
Security assessments are costly and time consuming and cannot be carried out from scratch each time a system is updated or modified. This motivates the need for specific methodology addressing the maintenance of assessment results, in particular, and a componentoriented approach to security assessment in general. This paper presents such a methodology in the setting of model-based security asse...
Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to properly define and dimension appropriate security architectures and policies for a network, the possible threats have to be identified and assessed both in terms of their impact on the resources to be protected and with res...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید