نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

Journal: :Developmental psychology 2013
Colleen M Ganley Leigh A Mingle Allison M Ryan Katherine Ryan Marina Vasilyeva Michelle Perry

Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 93...

Journal: :Evolutionary psychology : an international journal of evolutionary approaches to psychology and behavior 2017
Chengyang Han Michal Kandrik Amanda C Hahn Claire I Fisher David R Feinberg Iris J Holzleitner Lisa M DeBruine Benedict C Jones

The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others' capacity to inflict physical harm. Although studies have suggested that men's faces and voices both contain information about their threat potential, one recent study suggested that men's faces are a more valid cue of their threat potential than their v...

2016
Sofiene Boulares Kamel Adi Luigi Logrippo

Organizations need to use flexible access control mechanisms where the access decisions to critical information assets are taken dynamically. In this paper, we present a framework for insider threat likelihood assessment within the context of access control systems. Our approach takes into account information flows, the trustworthiness of subjects, the sensitivity of objects and the security co...

2010
Lance Baxter Randy Simpson John Prebola Marc Smotherman Douglas K. Moore Rudolf Goldflam Dawn Battles

The development of the first phase of the Space Threat Assessment Testbed (STAT) facility, known as Spiral 1, will provide a capability to test space hardware without the expense of space flight. Key features of STAT include the capability to replicate effects of complex natural space environments occurring at low earth and geosynchronous orbits. In addition, STAT will simulate key artificial t...

2016
Georg Macher Eric Armengaud Eugen Brenner Christian Kreiner

2017
Salaheddin Darwish Ilia Nouretdinov Stephen D. Wolthusen

The Medical Internet of Things (MIoT) has applications beyond clinical settings including in outpatient and care environments where monitoring is occurring over public networks and may involve non-dedicated devices. This poses a number of security and privacy challenges exacerbated by a heterogeneous and dynamic environment, but still requires standards for handling personally identifiable and ...

Journal: :Environmental Health Perspectives 1999
J D Rouse C A Bishop J Struger

The potential for nitrate to affect amphibian survival was evaluated by examining the areas in North America where concentrations of nitrate in water occur above amphibian toxicity thresholds. Nitrogen pollution from anthropogenic sources enters bodies of water through agricultural runoff or percolation associated with nitrogen fertilization, livestock, precipitation, and effluents from industr...

2004
Fok Bolderheij Piet van Genderen

Sensor Management is becoming increasingly complex due to the shift in naval missions, the introduction of new sensor systems like the Multifunction Radar and sensor data fusion objectives. This paper identifies the relevant, mission related information necessary for Sensor Management, by analyzing the Command and Control (C2) processes. A model is used that distinguishes four main processes th...

Journal: :Journal of environmental quality 2016
Carl F Cerco

The Conowingo Reservoir is situated on the Susquehanna River, immediately upstream of Chesapeake Bay, the largest estuary in the United States. Sedimentation in the reservoir provides an unintended benefit to the bay by preventing sediments, organic matter, and nutrients from entering the bay. The sediment storage capacity of the reservoir is nearly exhausted, however, and the resulting increas...

2014
Maragathavalli Palanivel Kanmani Selvadurai

Security testing is a process of determining risks present in the system states and protects them from vulnerabilities. But security testing does not provide due importance to threat modeling and risk analysis simultaneously that affects confidentiality and integrity of the system. Risk analysis includes identification, evaluation and assessment of risks. Threat modeling approach is identifying...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید