نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
Anxious individuals demonstrate threat-related attention biases both when threat stimuli are presented within conscious awareness and when presented below awareness threshold. Nevertheless, attention bias modification (ABM) research has rarely utilized sub-awareness protocols in an attempt to modify attention patterns and reduce anxiety. Exploring the potential of subliminal ABM is of interest,...
Design of efficient distributed sensing/fusion networks involves issues such as sensor mobility, bandwidth capacity and reliability of communication links. Communication links between the sensors and fusion centers referred to as clusterheads are prone to jamming or foliage effects. In a recent paper, Patel et al. (2005) proposed a dynamic maximal expected coverage model for sensor networks ope...
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threat...
The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient’s vital signs. This integration creates environments that are conducive to malicious activities. The potent...
In December 2017, the Third Generation Partnership Project (3GPP) released the first set of specifications for 5G New Radio (NR), which is currently the most widely accepted 5G cellular standard. 5G NR is expected to replace LTE and previous generations of cellular technology over the next several years, providing higher throughput, lower latency, and a host of new features. Similar to LTE, the...
This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, redistribution , reselling , loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to da...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید