Filters
Threat analysis based on the graph of elementary threats.
At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a <...
JA - Elektronika a optoelektronika, elektrotechnika
- 2008 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Threat analysis based on the graph of elementary threats
At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. In this paper, a method for threat...
JA - Elektronika a optoelektronika, elektrotechnika
- 2008 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
threats analysis
threats analysis...
KA - Vojenství
- 2006 •
- NmetC
Rok uplatnění
NmetC - Metodiky certifikované oprávněným orgánem
Redefining threats: extending the threat response focus from external to internal threats
Main topics of the document: internal threats; ICT security; digital evidence; insider incident...
Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
- 2024 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Hybrid threats - a phenomenon of wars of the 21st century
The expert article describes modern security threats - hybrid threats.
Law
- 2021 •
- O •
- Link
Rok uplatnění
O - Ostatní výsledky
Výsledek na webu
Computer Consulting: Threats on the Internet, computer security
Radio program from the series "We advise you," focused on cyber threats and threats on the Internet.
IN - Informatika
- 2016 •
- A •
- Link
Rok uplatnění
A - Audiovizuální tvorba
Výsledek na webu
Balance of Threat Reconsidered: Construction of Threat in Contemporary Russia
The author analyses questions connected with construction of threat in contemporary Russia.
AD - Politologie a politické vědy
- 2004 •
- D
Rok uplatnění
D - Stať ve sborníku
Irredentism: Traditional and New Dimension of Threat to the Czech Republic
This article deals with the threat of irredentism for the Czech Republic Republic. It defines the term irredentism and its dimensions. The irredentist threats threats are conceptualized (new dimension of traditional thr...
AD - Politologie a politické vědy
- 2010 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Threats and their triggers in the globalized economy
, object-process approach to analysing security threats of various categories. The paper generally analyses and categorises the sources and characteristics of threats according to various factors, which in practice may pose a th...
Economics and Business
- 2022 •
- Jimp •
- Link
Rok uplatnění
Jimp - Článek v periodiku v databázi Web of Science
Výsledek na webu
Threat perception in the speeches of G. W. Bush and B. Obama: A comparison
This paper presents the results of an analysis of speeches of the U.S. Presidents with the focus on threat perception.
AI - Jazykověda
- 2010 •
- C
Rok uplatnění
C - Kapitola v odborné knize
- 1 - 10 out of 7 836