نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
This report reviews methodologies and applications in the literature pertaining to decision making problems in the presence of adversaries. This investigation is essentially motivated by the need to determine optimal strategies against an adversarial and adaptive opponent. Such a problem arises in the context of terrorism threats. Probabilistic risk analysis is an insightful approach to this en...
[Context and motivation] To remedy the lack of security expertise, industrial security risk assessment methods come with catalogues of threats and security controls. [Question/problem] We investigate in both qualitative and quantitative terms whether the use of catalogues of threats and security controls has an effect on the actual and perceived effectiveness of a security risk assessment metho...
Despite the increasing prevalence, microblogging users are likely to face great challenges in assessing the credibility of health information due to the user-generated nature of content and length restriction on each microblog post. In this study we aim to explore how microblog users assess the credibility of health advice in terms of microblog posts. By incorporating the Elaboration Likelihood...
Arup has undertaken security risk assessments for designs and analyses of major infrastructure projects. As part of engineering team efforts, Arup Risk Consulting performs risk assessments and supports decision analyses for threats of explosives and chemical, biological or radiological agents for buildings, urban transit centres, bridges, public bus systems and airport facilities. The work is t...
It is not only important for security analysts to judge some binary code is malicious or not, but also to understand the malware “what to do” and “what’s the impact it posed on our information system”. In this paper, we proposed a novel information fusion model to quantitate the threat of malware. The model consists of three levels: the decision making level information fusion, the attribute le...
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when ...
Threat assessment has been widely recommended as a violence prevention approach for schools, but there are few empirical studies of its use. This nonexperimental study of 280 Virginia public high schools compared 95 high schools using the Virginia threat assessment guidelines (Cornell & Sheras, 2006), 131 following other (i.e., locally developed) threat assessment procedures, and 54 not using a...
Decision makers operating in modern defence theatres need to comprehend and reason with huge quantities of potentially uncertain and imprecise data in a timely fashion. In this paper, an automatic information fusion system is developed which aims at supporting a commander’s decision making by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a thr...
learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...
Information security threat assessment involves two aspects, namely, technology and management. A great amount of uncertainties exist in the assessment, which cannot be strictly quantized. Thus, the completely objective information security risk assessment is hard to realize. To this end, this research proposed an information security threat assessment model based on Bayesian Network (BN) and O...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید