Filters
Show more
Show more
Show less
Show less
Show less
Show more
Show more
More filters
Results
Threat analysis based on the graph of elementary threats.
At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a <...
JA - Elektronika a optoelektronika, elektrotechnika
- 2008 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Threat analysis based on the graph of elementary threats
At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. In this paper, a method for threat...
JA - Elektronika a optoelektronika, elektrotechnika
- 2008 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
threats analysis
threats analysis...
KA - Vojenství
- 2006 •
- NmetC
Rok uplatnění
NmetC - Metodiky certifikované oprávněným orgánem
Hybrid threats - a phenomenon of wars of the 21st century
The expert article describes modern security threats - hybrid threats.
Law
- 2021 •
- O •
- Link
Rok uplatnění
O - Ostatní výsledky
Výsledek na webu
Computer Consulting: Threats on the Internet, computer security
Radio program from the series "We advise you," focused on cyber threats and threats on the Internet.
IN - Informatika
- 2016 •
- A •
- Link
Rok uplatnění
A - Audiovizuální tvorba
Výsledek na webu
Balance of Threat Reconsidered: Construction of Threat in Contemporary Russia
The author analyses questions connected with construction of threat in contemporary Russia.
AD - Politologie a politické vědy
- 2004 •
- D
Rok uplatnění
D - Stať ve sborníku
Irredentism: Traditional and New Dimension of Threat to the Czech Republic
This article deals with the threat of irredentism for the Czech Republic Republic. It defines the term irredentism and its dimensions. The irredentist threats threats are conceptualized (new dimension of traditional thr...
AD - Politologie a politické vědy
- 2010 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Threat perception in the speeches of G. W. Bush and B. Obama: A comparison
This paper presents the results of an analysis of speeches of the U.S. Presidents with the focus on threat perception.
AI - Jazykověda
- 2010 •
- C
Rok uplatnění
C - Kapitola v odborné knize
Securitization of Threats in the Czech Republic
The paper deals with the topic of securitization of security threats and their perception by the public in the Czech Republic. It focuses on comparing the situation in theperception of threats and their origin, and attempts to demon...
AD - Politologie a politické vědy
- 2010 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
On ways out of the phenomenon of endangerment
The phenomena of threat, menace, endangerment and fearlessness, related, are reflected in the present text. What is the opposite or the dam of threat? How to face the emptiness and the feeling of abandonment or loneliness that is as...
Philosophy, History and Philosophy of science and technology
- 2022 •
- C •
- Link
Rok uplatnění
C - Kapitola v odborné knize
Výsledek na webu
- 1 - 10 out of 7 094