نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
Current models of market structure are descriptive in nature and lack theoretical grounding in consumer behavior. Such grounding is especially needed in the specification of marketing strategies. A self-regulatory model of consumer consideration-set formation will be employed as a basis of market structure in this article. The authors propose and show that consumers regulate their behavior acco...
When undertaking cyber security risk assessments, we must assign numeric values to metrics to compute the final expected loss that represents the risk that an organization is exposed to due to cyber threats. Even if risk assessment is motivated from real-world observations and data, there is always a high chance of assigning inaccurate values due to different uncertainties involved (e.g., evolv...
Local Area Networks(LAN) at present become an important instrument for organizing of process and information communication in an organization. They provides important purposes such as association of large amount of data, hardware and software resources and expanding of optimum communications. Becase these network do work with valuable information, the problem of security providing is an importa...
Risk assessment is concerned with discovering threat paths between potential attackers and critical assets, and is generally carried out during a system’s design and then at fixed intervals during its operational life. However, the currency of such analysis is rapidly eroded by system changes; in dynamic systems these include the need to support ad-hoc collaboration, and dynamic connectivity be...
We comment on a recent article by Newton (Environ. Model. Softw. (2010), 25, 15-23), which proposed a method, based on a Bayesian belief networks, for classifying the threat status of species under the IUCN Red List Categories and Criteria, and compared this method to an earlier one that we had developed that is based on fuzzy logic. There are three types of differences between the results of t...
Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In contrast, we use risk computation to drive changes in an operating system’s security configuration. This allows risk management to occur in real time and reduces the window of exposure to attack. We posit that it is possible to ...
The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard does not concern threat analysis for malicious attackers or how to select appropriate security counter...
OBJECTIVES Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasi...
Animal-vehicle collisions (AVCs) are a substantial problem in a human-dominated world, but little is known about what goes wrong, from the animal's perspective, when a collision occurs with an automobile, boat, or aircraft. Our goal is to provide insight into reactions of animals to oncoming vehicles when collisions might be imminent. Avoiding a collision requires successful vehicle detection, ...
Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitativel...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید