نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

Journal: :مجله علوم اعصاب شفای خاتم 0
maryam mousavi nik clinical psychology, mental health research center, tehran institute of psychiatry, school of behavioral sciences and mental health, iran university of medical sciences, tehran, iran mohammad bagher saberi zafarghandi department of addiction, mental health research center, tehran institute of psychiatry, school of behavioral sciences and mental health, iran university of medical sciences, tehran, iran ali assari department of urbanism, pardis branch, islamic azad university, tehran, iran

posttraumatic stress disorder (ptsd) is a common response to traumatic events. a cognitive model proposed that ptsd becomes chronic when individuals process the trauma in a way that leads to a sense of serious, current threat. the sense of threat arises as an outcome of excessively negative appraisals of the trauma and its sequel and a disturbance of autobiographical memory. variations in the n...

2009
Laurie A. Williams Michael Gegick Andrew Meneely

Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of...

Journal: :Int. Arab J. Inf. Technol. 2013
Bugra Karabey Nazife Baykal

In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially req...

2007
Jamshed Hasan

Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technolo...

Journal: :JNW 2006
Valer Bocan Vladimir Cretu

Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which open...

2013
Christopher R. Brown Frank L. Greitzer Alison Watkins

The development of a psycholinguistic measure of insider threat risk faces many challenges. Prior research suggests that psycholinguistic analysis has potential for identifying individuals who are high risks for insider/criminal activity, but testing and validation of proposed methods is hampered by lack of available data. For example, analytic tools can discriminate text samples authored by kn...

2007
Herman Autrup Peter Calow Wolfgang Dekant Helmut Greim Wojciech Hanke Colin Janssen Bo Jansson Hannu Komulainen Ole Ladefoged Jan Linders Inge Mangelsdorf Marco Nuti Jerzy Sokal Anne Steenhout Jose Tarazona Emanuela Testai Marco Vighi Matti Viluksela

Three independent non-food Scientific Committees provide the Commission with the scientific advice it needs when preparing policy and proposals relating to consumer safety, public health and the environment. The Committees also draw the Commission's attention to the new or emerging problems which may pose an actual or potential threat. SCHER Questions relating to examinations of the toxicity an...

2006
Fabrizio Baiardi S. Suin Claudio Telmon M. Pioli

We outline a framework for the risk assessment of information infrastructures that generalizes the notion of dependency with respect to attributes such as confidentiality, integrity or availability. Dependencies are used to model an infrastructure at distinct abstraction levels and to discover attack strategies as well as risk mitigation plans. A plan is formulated in terms of set of countermea...

2010
S. D. Kalpande R. C. Gupta M. D. Dandekar

Small and Medium scale Enterprises (SMEs) playing a vital role in nation’s economy. Many studies have demonstrated the positive impact of Total Quality Management (TQM) practices on Small and Medium scale enterprises. These have relied on manager’s self assessment of performance in reaching the objectives of study. It is also observed that many SMEs are ineffective and some are closed down. The...

2007
Marta B. Manser

To show context appropriate antipredator behaviour, animals require information about a predators' motivation to hunt, and consequently the level of danger to which they are exposed at any given moment. In addition to deterring a predator, mobbing behaviour, in which animals approach a potential predator, might also provide information useful in predation risk assessment. Here we present the re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید