All
All

What are you looking for?

All
Projects
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

-
19002100

Join usingOrAnd

Join usingOrAnd

SelectAll/None
  • Show more

SelectAll/None
  • Show more

      • Show less

      • Show less

      • Show less

    • Show more

SelectAll/None
  • Show more

More filters

Results

7 094 results (0,738s)

Result

Threat analysis based on the graph of elementary threats.

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a <...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2008
  • Jx
Result

Threat analysis based on the graph of elementary threats

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. In this paper, a method for threat...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2008
  • Jx
Result

threats analysis

threats analysis...

KA - Vojenství

  • 2006
  • NmetC
Result

Hybrid threats - a phenomenon of wars of the 21st century

The expert article describes modern security threats - hybrid threats.

Law

  • 2021
  • O
  • Link
Result

Computer Consulting: Threats on the Internet, computer security

Radio program from the series "We advise you," focused on cyber threats and threats on the Internet.

IN - Informatika

  • 2016
  • A
  • Link
Result

Balance of Threat Reconsidered: Construction of Threat in Contemporary Russia

The author analyses questions connected with construction of threat in contemporary Russia.

AD - Politologie a politické vědy

  • 2004
  • D
Result

Irredentism: Traditional and New Dimension of Threat to the Czech Republic

This article deals with the threat of irredentism for the Czech Republic Republic. It defines the term irredentism and its dimensions. The irredentist threats threats are conceptualized (new dimension of traditional thr...

AD - Politologie a politické vědy

  • 2010
  • Jx
Result

Threat perception in the speeches of G. W. Bush and B. Obama: A comparison

This paper presents the results of an analysis of speeches of the U.S. Presidents with the focus on threat perception.

AI - Jazykověda

  • 2010
  • C
Result

Securitization of Threats in the Czech Republic

The paper deals with the topic of securitization of security threats and their perception by the public in the Czech Republic. It focuses on comparing the situation in theperception of threats and their origin, and attempts to demon...

AD - Politologie a politické vědy

  • 2010
  • D
  • Link
Result

On ways out of the phenomenon of endangerment

The phenomena of threat, menace, endangerment and fearlessness, related, are reflected in the present text. What is the opposite or the dam of threat? How to face the emptiness and the feeling of abandonment or loneliness that is as...

Philosophy, History and Philosophy of science and technology

  • 2022
  • C
  • Link
  • 1 - 10 out of 7 094