نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

2005
Erim Kardes Randolph Hall

This report reviews methodologies and applications in the literature pertaining to decision making problems in the presence of adversaries. This investigation is essentially motivated by the need to determine optimal strategies against an adversarial and adaptive opponent. Such a problem arises in the context of terrorism threats. Probabilistic risk analysis is an insightful approach to this en...

2015
Martina de Gramatica Katsiaryna Labunets Fabio Massacci Federica Paci Alessandra Tedeschi

[Context and motivation] To remedy the lack of security expertise, industrial security risk assessment methods come with catalogues of threats and security controls. [Question/problem] We investigate in both qualitative and quantitative terms whether the use of catalogues of threats and security controls has an effect on the actual and perceived effectiveness of a security risk assessment metho...

2014
Junhui Jiang Nadee Goonawardene Sharon Swee-Lin Tan

Despite the increasing prevalence, microblogging users are likely to face great challenges in assessing the credibility of health information due to the user-generated nature of content and length restriction on each microblog post. In this study we aim to explore how microblog users assess the credibility of health advice in terms of microblog posts. By incorporating the Elaboration Likelihood...

2005
G. Katzman

Arup has undertaken security risk assessments for designs and analyses of major infrastructure projects. As part of engineering team efforts, Arup Risk Consulting performs risk assessments and supports decision analyses for threats of explosives and chemical, biological or radiological agents for buildings, urban transit centres, bridges, public bus systems and airport facilities. The work is t...

2016
Chao Dai Jianmin Pang Xiaochuan Zhang Guanghui Liang

It is not only important for security analysts to judge some binary code is malicious or not, but also to understand the malware “what to do” and “what’s the impact it posed on our information system”. In this paper, we proposed a novel information fusion model to quantitate the threat of malware. The model consists of three levels: the decision making level information fusion, the attribute le...

2014
Kuei-Hu Chang

Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when ...

2009
Dewey Cornell Peter Sheras Anne Gregory Xitao Fan

Threat assessment has been widely recommended as a violence prevention approach for schools, but there are few empirical studies of its use. This nonexperimental study of 280 Virginia public high schools compared 95 high schools using the Virginia threat assessment guidelines (Cornell & Sheras, 2006), 131 following other (i.e., locally developed) threat assessment procedures, and 54 not using a...

2007
A. Benavoli B. Ristic A. Farina M. Oxenham L. Chisci

Decision makers operating in modern defence theatres need to comprehend and reason with huge quantities of potentially uncertain and imprecise data in a timely fashion. In this paper, an automatic information fusion system is developed which aims at supporting a commander’s decision making by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a thr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...

2013
Kehe Wu Shichao Ye

Information security threat assessment involves two aspects, namely, technology and management. A great amount of uncertainties exist in the assessment, which cannot be strictly quantized. Thus, the completely objective information security risk assessment is hard to realize. To this end, this research proposed an information security threat assessment model based on Bayesian Network (BN) and O...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید