نتایج جستجو برای: cyber risk
تعداد نتایج: 957999 فیلتر نتایج به سال:
Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime Supply Chains (SCs) for ports operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not adequately address security processes for international SCs. Motivated by these limitations, we have developed and will valid...
Not a day goes by without news about cyber attack. Fear spreads out and lots of wrong ideas circulate. This survey aims at showing how all these uncertainties can be transformed into manageable risk. After reviewing the main characteristics risk, we consider three layers space: hardware, software psycho-cognitive layer. We ask ourselves is this risk different from others, modelling has been tac...
This paper deals with problems of the development and security distributed information systems. It explores challenges risk modeling in such systems suggests a risk-modeling approach that is responsive to requirements complex, distributed, large-scale article provides aggregate on various assessment methodologies; as quantitative, qualitative, hybrid methods; comparison their advantages disadva...
Statistical analysis of speech is an emerging area machine learning. In this paper, we tackle the biometric challenge Automatic Speaker Verification (ASV) differentiating between samples generated by two distinct populations utterances, those authentic human voice and a synthetic one. Solving such issue through statistical perspective foresees definition decision rule function learning procedur...
The growth of the Internet Things (IoT) has accelerated digital transformation processes in organizations and cities. However, it also opened new security challenges due to complexity dynamism these systems. application risk analysis methodologies used evaluate information technology (IT) systems have their limitations qualitatively assess risks IoT systems, lack historical data dynamic behavio...
In Internet security, traditional protection mechanisms such as anti-virus software, firewalls, and other add-ons are not capable of completely eliminating security risks [3]. As noted in [7], the management of information security needs to be addressed through economic, psychological, and policymaking approaches, in combination with engineering approaches. As a realistic and futuristic solutio...
This study applies Bayesian Inference to estimate flood risk for 53 dyke ring areas in the Netherlands, and focuses particularly on the data scarcity and extreme behaviour of catastrophe risk. The probability density curves of flood damage are estimated through Monte Carlo simulations. Based on these results, flood insurance premiums are estimated using two different practical methods that each...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید