نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
Abstract Threat assessment is an important process of quantifying the threat enemy attacking targets. It also one main basis for commanders to make control decisions in air defense operations. Target needs obtain a large amount attack target information from various reconnaissance equipment and battlefield sensors, fuse these information, get ranking degree targets our side. In view unbalanced ...
Threat intelligence sharing has become a growing concept, whereby entities can exchange patterns of threats with each other, in the form of indicators, to a community of trust for threat analysis and incident response. However, sharing threat-related information have posed various risks to an organization that pertains to its security, privacy, and competitiveness. Given the coinciding benefits...
abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...
In this chapter, a novel performance model for assessing security of a layered network has been proposed. The work is motivated by the fact that there is a need for a reference framework to account for all threats to a networked system. There are few such models available, and one of them is recommended by the International Telecommunications Union (ITU). The proposed assessment model is based ...
Situations of potential agonistic conflict demand rapid and effective decision-making. The process of threat assessment includes assessments of relative fighting capacity, assessments of the likelihood of attack, and assessments of the extent to which one′s assets are at risk. The dimensions of physical size and strength appear to serve as key parameters in a cognitive representation summarizin...
BACKGROUND Recent studies suggest that assessment of threat-related attention bias may be useful in identifying soldiers at risk for clinical symptoms. The present study assessed the degree to which soldiers experienced combat events and showed attentional threat avoidance affected their reported levels of post-traumatic stress disorder (PTSD) and anxiety symptoms. METHODS Four months after a...
We describe a framework for threat assessment specifically within the context of access control systems, where subjects request access to resources for which they may not be pre-authorized. The framework that we describe includes four different approaches for conducting threat assessment: an object sensitivity-based approach, a subject trustworthiness-based approach and two additional approache...
This article presents additional necessary measures that enable us to use Pict as an object-capability programing language. It is desirable to be able to assess the worst possible threat that we—users— risk if we run a given program. If we know the threat, we are able to decide whether or not we are willing to risk running the program. The cost of a security audit that reveals such an assessmen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید