All
All

What are you looking for?

All
Projects
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

-
19912024

Join usingOrAnd

Join usingOrAnd

SelectAll/None
  • Show more

SelectAll/None
  • Show more

      • Show more

      • Show more

      • Show more

    • Show more

SelectAll/None
  • Show more

More filters

Results

192 996 results (1,148s)

Result

Threat analysis based on the graph of elementary threats.

At present, an analysis based on the threat tree is used for analysis feature of this method. If the analysis is more extensive, then a threat tree is created for eachsingle threat. This solution ...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2008
  • Jx
Result

Threat analysis based on the graph of elementary threats

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. In this paper, a method f...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2008
  • Jx
Result

threats analysis

threats analysis...

KA - Vojenství

  • 2006
  • NmetC
Result

Fire Safety Threat Risk Analysis For Soft Target

to this issue. This article deals with a qualitative risk analysis of soft target threats and their types. Qualitative risk analysis of soft targets threats compares and evaluates of soft target for this threa...

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2021
  • D
  • Link
Result

Risk analysis

Basic themes of document: risk; risk analysis; asset; threat; quantitative and qualitative methods...

IN - Informatika

  • 2010
  • D
Result

Modelling of Threats Interdependencies

The article shows approach to model of relationship between threats. Many algorithms of risk analysis ignore the interrelationship between the events. For the present world are typical increasing interdependences of critical infrast...

AE - Řízení, správa a administrativa

  • 2010
  • Jx
Result

Threat perception in the speeches of G. W. Bush and B. Obama: A comparison

This paper presents the results of an analysis of speeches of the U.S. Presidents with the focus on threat perception.

AI - Jazykověda

  • 2010
  • C
Result

Flood risk map with the analysis of threats to sensitive objects

Flood risk map screens analysis of threats to sensitive objects in area of Breclavsko.

JN - Stavebnictví

  • 2014
  • Nmap
Result

Why and how to evaluate the task threatness

The concept of threatness of project task combines two views - task criticalness and failureness. For their analysis we introduce the task threatness matrix, tool for analysis of the criticalness and failureness po...

Business and management

  • 2021
  • O
  • Link
Result

The Security Analysis of the Organization. In Pre-Conference Proceedings of the Special Focus Symposium on 2nd IKS: Information and Knowledge Systems

the threats that cancause loss of assets of the organization. Very effective tool for the analysis of threats based on elementary graph threats, in essence an analysis of the threats and trimmed ...

AE - Řízení, správa a administrativa

  • 2010
  • D
  • 1 - 10 out of 192 996