نتایج جستجو برای: cyber risk

تعداد نتایج: 957999  

2017
Armend Duzha Panagiotis Gouvas Monica Canepa

Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime Supply Chains (SCs) for ports operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not adequately address security processes for international SCs. Motivated by these limitations, we have developed and will valid...

Journal: :Scandinavian Actuarial Journal 2023

Not a day goes by without news about cyber attack. Fear spreads out and lots of wrong ideas circulate. This survey aims at showing how all these uncertainties can be transformed into manageable risk. After reviewing the main characteristics risk, we consider three layers space: hardware, software psycho-cognitive layer. We ask ourselves is this risk different from others, modelling has been tac...

Journal: :Applied sciences 2023

This paper deals with problems of the development and security distributed information systems. It explores challenges risk modeling in such systems suggests a risk-modeling approach that is responsive to requirements complex, distributed, large-scale article provides aggregate on various assessment methodologies; as quantitative, qualitative, hybrid methods; comparison their advantages disadva...

Journal: :IEEE Access 2021

Statistical analysis of speech is an emerging area machine learning. In this paper, we tackle the biometric challenge Automatic Speaker Verification (ASV) differentiating between samples generated by two distinct populations utterances, those authentic human voice and a synthetic one. Solving such issue through statistical perspective foresees definition decision rule function learning procedur...

Journal: :Games 2022

The growth of the Internet Things (IoT) has accelerated digital transformation processes in organizations and cities. However, it also opened new security challenges due to complexity dynamism these systems. application risk analysis methodologies used evaluate information technology (IT) systems have their limitations qualitatively assess risks IoT systems, lack historical data dynamic behavio...

2010
Ranjan Pal Leana Golubchik

In Internet security, traditional protection mechanisms such as anti-virus software, firewalls, and other add-ons are not capable of completely eliminating security risks [3]. As noted in [7], the management of information security needs to be addressed through economic, psychological, and policymaking approaches, in combination with engineering approaches. As a realistic and futuristic solutio...

2013
Y. Paudel

This study applies Bayesian Inference to estimate flood risk for 53 dyke ring areas in the Netherlands, and focuses particularly on the data scarcity and extreme behaviour of catastrophe risk. The probability density curves of flood damage are estimated through Monte Carlo simulations. Based on these results, flood insurance premiums are estimated using two different practical methods that each...

Journal: :Pharmaceuticals Policy and Law 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید