All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

205 229 (0,256s)

Result

Threat analysis based on the graph of elementary threats.

At present, an analysis based on the threat tree is used for analysis feature of this method. If the analysis is more extensive, then a threat tree is created for eachsingle threat. This solution ...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2008
  • Jx
Result

Threat analysis based on the graph of elementary threats

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. In this paper, a method f...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2008
  • Jx
Result

threats analysis

threats analysis...

KA - Vojenství

  • 2006
  • NmetC
Result

Fire Safety Threat Risk Analysis For Soft Target

to this issue. This article deals with a qualitative risk analysis of soft target threats and their types. Qualitative risk analysis of soft targets threats compares and evaluates of soft target for this threa...

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2021
  • D
  • Link
Result

Modelling of Threats Interdependencies

The article shows approach to model of relationship between threats. Many algorithms of risk analysis ignore the interrelationship between the events. For the present world are typical increasing interdependences of critical infrast...

AE - Řízení, správa a administrativa

  • 2010
  • Jx
Result

Risk analysis

Basic themes of document: risk; risk analysis; asset; threat; quantitative and qualitative methods...

IN - Informatika

  • 2010
  • D
Result

Threat perception in the speeches of G. W. Bush and B. Obama: A comparison

This paper presents the results of an analysis of speeches of the U.S. Presidents with the focus on threat perception.

AI - Jazykověda

  • 2010
  • C
Result

Flood risk map with the analysis of threats to sensitive objects

Flood risk map screens analysis of threats to sensitive objects in area of Breclavsko.

JN - Stavebnictví

  • 2014
  • Nmap
Result

Why and how to evaluate the task threatness

The concept of threatness of project task combines two views - task criticalness and failureness. For their analysis we introduce the task threatness matrix, tool for analysis of the criticalness and failureness po...

Business and management

  • 2021
  • O
  • Link
Result

Cyber security and its pillars in the analysis of the perception of the seriousness of threats to the state

An integral part of the state's resistance to hybrid threats is also its cyber of threats to the state through Cyber Security. We present the research questions and the results of the statistical analysis of the data obtain...

Social sciences, interdisciplinary

  • 2024
  • D
  • 1 - 10 out of 205 229