نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

2011
Andrea Herrmann Ayse Morali Sandro Etalle Roel Wieringa

Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement ―good-enough security‖ but need to be able to justify their security investment plans. Currently companies achieve this by means of checklist-based security assessments, but these methods are a way to achieve consensus without bei...

Journal: :IJCIP 2013
Stephen M. Papa William D. Casper Tyler Moore

It has been widely reported that industrial control systems underpinning critical infrastructures ranging from power plants to oil refineries are vulnerable to cyber attacks. A slew of countermeasures have been proposed to secure these systems, but their adoption has been disappointingly slow according to many experts. Operators have been reluctant to spend large sums of money to protect agains...

2013
Steve Papa William Casper Tyler Moore

It has been widely reported that industrial control systems underpinning critical infrastructures ranging from power plants to oil refineries are vulnerable to cyberattack. A slew of countermeasures have been proposed to secure these systems, yet their adoption has been disappointingly slow according to many experts. Operators have been reluctant to spend large sums protecting against threats t...

2016
Cassie J. HILDITCH Jillian DORRIAN Siobhan BANKS

Sleep inertia is the period of impaired performance and grogginess experienced after waking. This period of impairment is of concern to workers who are on-call, or nap during work hours, and need to perform safety-critical tasks soon after waking. While several studies have investigated the best sleep timing and length to minimise sleep inertia effects, few have focused on countermeasures -espe...

2015
Vijay K. Singh Patricia L.P. Romaine Thomas M. Seed

World events over the past decade have highlighted the threat of nuclear terrorism as well as an urgent need to develop radiation countermeasures for acute radiation exposures and subsequent bodily injuries. An increased probability of radiological or nuclear incidents due to detonation of nuclear weapons by terrorists, sabotage of nuclear facilities, dispersal and exposure to radioactive mater...

2011
C. R. Viau

The following investigation evaluated the effectiveness of expendable infrared countermeasures (flares) in the protection of a fast jet against imaging infrared seekers. The report presents an effectiveness evaluation process and analyzes the results of Monte Carlo simulation runs. The goal of the investigation was to determine if expendable countermeasures (specifically spatially distributed f...

1997
KAY FITZPATRICK

The issue of truck accidents on urban freeways is a vital concern for both traffic managers and the general public. The passage of the Surface Transportation Assistance Act of 1982 and recently the North American Free Trade Agreement has increased the numbers of large combination vehicles on the highway system. The rise in truck volume (defined as vehicles exceeding 4.5 Mg (10,000 lbs), the int...

2014
Zhizheng Wu Tomi Kinnunen Nicholas Evans Junichi Yamagishi

The ASVspoof initiative follows on from the first special session in spoofing and countermeasures for automatic speaker verification (ASV) held during the 2013 edition of INTERSPEECH in Lyon, France [1]. The vision behind that first edition was to promote the consideration of spoofing, to encourage the development of anti-spoofing countermeasures and to gather a community to design, collect and...

2018
Jianwei Shi Rui Liu Hua Jiang Chunxu Wang Yue Xiao Nana Liu Zhaoxin Wang Leiyu Shi

OBJECTIVES Few studies have systematically examined the effects of the existing regulations for alleviating corruption in China. This study assesses the effectiveness of China's reforms to curb medical corruption. METHODS We used mixed methods for the evaluation of existing countermeasures. First, qualitative informant interviews based on the Donabedian model were conducted to obtain experts'...

2000
Thomas S. Messerges

Techniques to protect software implementations of the AES candidate algorithms from power analysis attacks are investigated. New countermeasures that employ random masks are developed and the performance characteristics of these countermeasures are analyzed. Implementations in a 32-bit, ARM-based smartcard are considered.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید