Filters
Show more
Show more
Show more
Show more
Show more
Show more
Show more
More filters
Results
Threat analysis based on the graph of elementary threats.
At present, an analysis based on the threat tree is used for analysis feature of this method. If the analysis is more extensive, then a threat tree is created for eachsingle threat. This solution ...
JA - Elektronika a optoelektronika, elektrotechnika
- 2008 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Threat analysis based on the graph of elementary threats
At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. In this paper, a method f...
JA - Elektronika a optoelektronika, elektrotechnika
- 2008 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
threats analysis
threats analysis...
KA - Vojenství
- 2006 •
- NmetC
Rok uplatnění
NmetC - Metodiky certifikované oprávněným orgánem
Fire Safety Threat Risk Analysis For Soft Target
to this issue. This article deals with a qualitative risk analysis of soft target threats and their types. Qualitative risk analysis of soft targets threats compares and evaluates of soft target for this threa...
Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
- 2021 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Risk analysis
Basic themes of document: risk; risk analysis; asset; threat; quantitative and qualitative methods...
IN - Informatika
- 2010 •
- D
Rok uplatnění
D - Stať ve sborníku
Modelling of Threats Interdependencies
The article shows approach to model of relationship between threats. Many algorithms of risk analysis ignore the interrelationship between the events. For the present world are typical increasing interdependences of critical infrast...
AE - Řízení, správa a administrativa
- 2010 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Threat perception in the speeches of G. W. Bush and B. Obama: A comparison
This paper presents the results of an analysis of speeches of the U.S. Presidents with the focus on threat perception.
AI - Jazykověda
- 2010 •
- C
Rok uplatnění
C - Kapitola v odborné knize
Flood risk map with the analysis of threats to sensitive objects
Flood risk map screens analysis of threats to sensitive objects in area of Breclavsko.
JN - Stavebnictví
- 2014 •
- Nmap
Rok uplatnění
Nmap - Specializovaná mapa s odborným obsahem
Why and how to evaluate the task threatness
The concept of threatness of project task combines two views - task criticalness and failureness. For their analysis we introduce the task threatness matrix, tool for analysis of the criticalness and failureness po...
Business and management
- 2021 •
- O •
- Link
Rok uplatnění
O - Ostatní výsledky
Výsledek na webu
The Security Analysis of the Organization. In Pre-Conference Proceedings of the Special Focus Symposium on 2nd IKS: Information and Knowledge Systems
the threats that cancause loss of assets of the organization. Very effective tool for the analysis of threats based on elementary graph threats, in essence an analysis of the threats and trimmed ...
AE - Řízení, správa a administrativa
- 2010 •
- D
Rok uplatnění
D - Stať ve sborníku
- 1 - 10 out of 192 996