• No results found

Threat Assessment

Modeling on Ballistic Missile Threat Assessment

Modeling on Ballistic Missile Threat Assessment

... BM threat assessment is the chief problem of Ballistic Missile Defense System assistant decision-making against plentiful BMs attacking [1-2], mainly calculating the BM threat degree and clarifying ...

9

Dynamic Threat Assessment for Prioritising Computer Network Security

Dynamic Threat Assessment for Prioritising Computer Network Security

... dynamic threat assessment technique such as compromise path analysis can be used to identify the relative risk posed to individual nodes in a network, and how a prioritisation strategy based upon this can ...

12

The spatial analysis of annual measles incidence and transition threat assessment in Iran in 2016

The spatial analysis of annual measles incidence and transition threat assessment in Iran in 2016

... Threat assessment of measles is evaluated based on fac- tors that may influence the risk of exposure and transmis- sion of measles virus among ...The threat assessment indicators are based on ...

6

A Conceptual Framework for Threat  Assessment Based on Organization’s  Information Security Policy

A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy

... with threat assessment tool is ...with threat assessment tools, the organization would have strategic rolling document for benchmarking at any time interval; for example, during the security ...

13

Competency Identification for Threat Assessment and Management Teams: A Modified Delphi Study.

Competency Identification for Threat Assessment and Management Teams: A Modified Delphi Study.

... of threat assessment teams, improved risk management processes, and better violence prevention programs at institutions of higher ...of threat assessment teams are ...

120

Bayesian Network Based Threat Assessment Method for Vehicle

Bayesian Network Based Threat Assessment Method for Vehicle

... the threat assessment method, and real-time requirement of the algorithm is vital ...in threat assessment [13], situation awareness [14] and other ...based threat assessment ...

7

Threat Barometer. Ten Years of Terrorist Threat Assessment Netherlands

Threat Barometer. Ten Years of Terrorist Threat Assessment Netherlands

... The reason for lowering the threat level in DTN 19 is that the Netherlands is less in the spotlight of the international jihadist networks and that the domestic networks have been relati[r] ...

46

Visualizing threat and impact assessment to improve situation awareness

Visualizing threat and impact assessment to improve situation awareness

... This thesis outlines a visualization for enhancing situation awareness through displaying threat and impact called ViSAw. Previous visualizations focused on displaying raw data to enhance situation awareness while ...

72

Communicating Terrorism: terrorist threat assessments in the Netherlands

Communicating Terrorism: terrorist threat assessments in the Netherlands

... terrorist threat assessment Netherlands stands ...source threat assessments perform a fundamental role in this and will be discussed in the following ...

84

Assessing Violence Risk in Threatening Communications

Assessing Violence Risk in Threatening Communications

... risk assessment is an important and challenging task undertaken by men- tal health professionals and others, in both clinical and nonclinical ...risk assessment pro- cess. However they could contribute to ...

8

Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

... Intra-Firm threat assessment: Prior to physically launching operations, an analysis should be conducted of the organization and of the market within which the organization is ...risk assessment ...

16

Distribution  of vegetation and the extent of land degradation in raid marwet region an analysis through geographic information system (gis)

Distribution of vegetation and the extent of land degradation in raid marwet region an analysis through geographic information system (gis)

... biological diversity, often do not have an intrinsic spatial dimension and are more often difficult to produce it on map format. Thus, it is well tried to characterize, to the extent possible, the overall existing levels ...

9

Research of Intelligent Fault Diagnosis Model on Multi-Information Fusion

Research of Intelligent Fault Diagnosis Model on Multi-Information Fusion

... c) Mathematical model is information fusion algorithms and integrated logic, Algorithm mainly Includes distributed detection, spatial integration, attribute fusion, situation assessment and threat ...

8

Risk Assessment Methodology for Quantifying the Impact of Scour : a serious threat to river crossings

Risk Assessment Methodology for Quantifying the Impact of Scour : a serious threat to river crossings

... RISK ASSESSMENT METHODOLOGY FOR QUANTIFYING THE IMPACT OF SCOUR BBN risk models provide a network where all the variables and relations between the variables can be seen, combined with the so called Bayesian ...

66

Simple Financial Economic Models of Fremont Maize Storage and an Assessment of External Threat

Simple Financial Economic Models of Fremont Maize Storage and an Assessment of External Threat

... A third possibility is that there may have been some external threat of theft or robbery. This could have been from local bands or families of Fremont farmers and horticulturists living in Range Creek and the ...

21

Toward Effective Access Control Using Attributes and Pseudoroles

Toward Effective Access Control Using Attributes and Pseudoroles

... ACCESS CONTROL MODELS ASSESSMENT Threat 1: Unauthorized access of health information use, disclosure, alteration, and destruction by healthcare providers 1.1: Gain authorized healthcare [r] ...

133

EMPLOYABILITY OF HEDGING IN MITIGATING RISK DERIVATIVES AND PORTFOLIO MANAGEMENT

EMPLOYABILITY OF HEDGING IN MITIGATING RISK DERIVATIVES AND PORTFOLIO MANAGEMENT

... As described by Rawls & Izakson (1999), variations between resource allowance and threat allowance can be outlined by analyzing the investment profile management procedure. In the early levels of the ...

29

TENSOR: retrieval and analysis of heterogeneous online content for terrorist activity recognition

TENSOR: retrieval and analysis of heterogeneous online content for terrorist activity recognition

... • Accessing social networks and closed groups: Gaining access, monitoring, acquiring evidence, and investigating “closed groups” on social networks and closed forums can be challenging. Investigators must often wait ...

51

Effectiveness of structured teaching programme regarding diet during lactation in terms of knowledge, attitude, and practice among primi para mothers in kasturba memorial hospital at Dindigul

Effectiveness of structured teaching programme regarding diet during lactation in terms of knowledge, attitude, and practice among primi para mothers in kasturba memorial hospital at Dindigul

... Structural variables Pre assessment of knowledge attitude practice regarding diet during lactation Perceived threat of developing mal nutrition for mother and baby Perceived Benefits: Ac[r] ...

137

A Risk Assessment of the Insider Threat in Commercial Aviation - The IRGC Risk Governance Framework Approach

A Risk Assessment of the Insider Threat in Commercial Aviation - The IRGC Risk Governance Framework Approach

... Comparing threat-based and risk-based perspectives to security shows how differently the question of security is ...The threat-based perspective depends on “intelligence in an attempt to eliminate danger” ...

60

Show all 10000 documents...

Related subjects