نتایج جستجو برای: threat assessment
تعداد نتایج: 609945 فیلتر نتایج به سال:
Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 93...
The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others' capacity to inflict physical harm. Although studies have suggested that men's faces and voices both contain information about their threat potential, one recent study suggested that men's faces are a more valid cue of their threat potential than their v...
Organizations need to use flexible access control mechanisms where the access decisions to critical information assets are taken dynamically. In this paper, we present a framework for insider threat likelihood assessment within the context of access control systems. Our approach takes into account information flows, the trustworthiness of subjects, the sensitivity of objects and the security co...
The development of the first phase of the Space Threat Assessment Testbed (STAT) facility, known as Spiral 1, will provide a capability to test space hardware without the expense of space flight. Key features of STAT include the capability to replicate effects of complex natural space environments occurring at low earth and geosynchronous orbits. In addition, STAT will simulate key artificial t...
The Medical Internet of Things (MIoT) has applications beyond clinical settings including in outpatient and care environments where monitoring is occurring over public networks and may involve non-dedicated devices. This poses a number of security and privacy challenges exacerbated by a heterogeneous and dynamic environment, but still requires standards for handling personally identifiable and ...
The potential for nitrate to affect amphibian survival was evaluated by examining the areas in North America where concentrations of nitrate in water occur above amphibian toxicity thresholds. Nitrogen pollution from anthropogenic sources enters bodies of water through agricultural runoff or percolation associated with nitrogen fertilization, livestock, precipitation, and effluents from industr...
Sensor Management is becoming increasingly complex due to the shift in naval missions, the introduction of new sensor systems like the Multifunction Radar and sensor data fusion objectives. This paper identifies the relevant, mission related information necessary for Sensor Management, by analyzing the Command and Control (C2) processes. A model is used that distinguishes four main processes th...
The Conowingo Reservoir is situated on the Susquehanna River, immediately upstream of Chesapeake Bay, the largest estuary in the United States. Sedimentation in the reservoir provides an unintended benefit to the bay by preventing sediments, organic matter, and nutrients from entering the bay. The sediment storage capacity of the reservoir is nearly exhausted, however, and the resulting increas...
Security testing is a process of determining risks present in the system states and protects them from vulnerabilities. But security testing does not provide due importance to threat modeling and risk analysis simultaneously that affects confidentiality and integrity of the system. Risk analysis includes identification, evaluation and assessment of risks. Threat modeling approach is identifying...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید