نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, Availability). This only possible if security taken into account at all stages SDLC (Software Development Life Cycle). Various approaches software quality have been developed, such as CMMI (Ca...
Nevertheless, there are many reasons for foodborne disease remaining a global public health challenge. As some diseases are controlled, others emerge as new threats. New agents of risk have occupied the ecological niche of those on which control pressure has been exerted, replacing the previous ones. The proportions of the population who are elderly, immunosuppressed or otherwise disproportiona...
How to analyze security alarms automatically and find useful information form them has attract a lot of interests. Although many alarm correlation approaches and risk assessment methods have been proposed, most of them were implemented with high computational complexity and time consuming, and they can not deal well with huge number of security alarms. This work focus on performing an real-time...
Drought affects virtually all regions of the world and results in significant economic, social and environmental impacts. The Federal Emergency Management Agency estimates annual drought-related losses in the United States at $6-8 billion, which is more than any other natural hazard. Congress enacted the Agricultural Risk Protection Act of 2000 to encourage the United States Department of Agric...
This paper assesses aircraft susceptibility from the first principles, with respect to the threat posed by passively guided infrared homing missiles; with an objective of gaining insight into the comprehensiveness of the relationship between aircraft susceptibility and aircraft infrared signature level. The conventional criterion of aircraft susceptibility assessment based on its lock-on envelo...
Several studies have proposed the concept of fuzzy logic technique" to assess risk in information security field. These studies revealed that in risk analysis process, evaluators face difficulties in collecting accurate data and adequate knowledge to estimate the probability of threats and its consequences. The estimated value contributes to data fuzziness. As a result, with the estimated value...
Approximately 25% (according to http://verifiedvoting.com/) of voting jurisdictions use direct recording electronic systems to record votes. Accurate tabulation of voter intent is critical to safeguard this fundamental act of democracy: voting. Electronic voting systems are known to be vulnerable to attack. Assessing risk to these systems requires a systematic treatment and cataloging of threat...
Risk assessment can provide a robust strategy for landscape-scale planning challenges associated with species conservation and habitat protection in Pacific Northwest forests. We provide an overview of quantitative and probabilistic ecological risk assessment with focus on the application of approaches and influences from the actuarial, financial, and technical engineering fields. Within this c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید