نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

Journal: :Computers, materials & continua 2022

Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, Availability). This only possible if security taken into account at all stages SDLC (Software Development Life Cycle). Various approaches software quality have been developed, such as CMMI (Ca...

2012
Susana Bayarri María Jesús Gracia Regina Lázaro Consuelo Pérez-Arquillué Antonio Herrera

Nevertheless, there are many reasons for foodborne disease remaining a global public health challenge. As some diseases are controlled, others emerge as new threats. New agents of risk have occupied the ecological niche of those on which control pressure has been exerted, replacing the previous ones. The proportions of the population who are elderly, immunosuppressed or otherwise disproportiona...

2010
Jie Ma Zhitang Li

How to analyze security alarms automatically and find useful information form them has attract a lot of interests. Although many alarm correlation approaches and risk assessment methods have been proposed, most of them were implemented with high computational complexity and time consuming, and they can not deal well with huge number of security alarms. This work focus on performing an real-time...

2004
Dustin Kozal Matt Culver Sherri K. Harms

Drought affects virtually all regions of the world and results in significant economic, social and environmental impacts. The Federal Emergency Management Agency estimates annual drought-related losses in the United States at $6-8 billion, which is more than any other natural hazard. Congress enacted the Agricultural Risk Protection Act of 2000 to encourage the United States Department of Agric...

2005
G. Arvind Rao Shripad P. Mahulikar

This paper assesses aircraft susceptibility from the first principles, with respect to the threat posed by passively guided infrared homing missiles; with an objective of gaining insight into the comprehensiveness of the relationship between aircraft susceptibility and aircraft infrared signature level. The conventional criterion of aircraft susceptibility assessment based on its lock-on envelo...

2010
Nurzaini Mohamad Zain Ganthan Narayana Samy Rabiah Ahmad Zuraini Ismail Azizah Bt Abdul Manaf

Several studies have proposed the concept of fuzzy logic technique" to assess risk in information security field. These studies revealed that in risk analysis process, evaluators face difficulties in collecting accurate data and adequate knowledge to estimate the probability of threats and its consequences. The estimated value contributes to data fuzziness. As a result, with the estimated value...

Journal: :IJISP 2011
J. Harold Pardue Jeffrey P. Landry Alec Yasinsac

Approximately 25% (according to http://verifiedvoting.com/) of voting jurisdictions use direct recording electronic systems to record votes. Accurate tabulation of voter intent is critical to safeguard this fundamental act of democracy: voting. Electronic voting systems are known to be vulnerable to attack. Assessing risk to these systems requires a systematic treatment and cataloging of threat...

2007
Becky K. Kerns Alan Ager

Risk assessment can provide a robust strategy for landscape-scale planning challenges associated with species conservation and habitat protection in Pacific Northwest forests. We provide an overview of quantitative and probabilistic ecological risk assessment with focus on the application of approaches and influences from the actuarial, financial, and technical engineering fields. Within this c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید