نتایج جستجو برای: threat
تعداد نتایج: 52909 فیلتر نتایج به سال:
History shows that ‘security, whether defined narrowly or widely, is a scarce commodity’. Therefore, it is generally observed that in face of security threat perceptions, states feel the necessity to combine their efforts to strengthen their own security by acting together. This brings us to the concept of collective security, which has been widely debated in the literature of international rel...
Innovative cities are essential for the economic growth and development of countries. At the same time, however, social and environmental problems related to city growth can be serious threats to the full realisation of the socio-economic contribution that cities can make. In this paper it is argued that the notion of a “system of innovation” is helpful in understanding the factors that shape t...
Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAP...
In a continued effort to better define the field of insider threat research, this study presents a survey of 30 cybersecurity experts’ opinions on the attributes of a prototypical insider and insider threat case. The survey is based on the attributes in the Entity-Relationship Model developed in a previous study of 42 different definitions of insider and insider threat. To develop clearer conse...
This paper suggest a generic threat model for the processes in e-learning systems. After a breaf discussion of the particularities of e-learning systems from the security point of view, the role of threat models in system security is explained. Then a characterization of the attackers is made, together with the assets and entry points identification and threats identification and classification...
Rare category detection refers to the problem of identifying the initial examples from underrepresented minority classes in an imbalanced data set. This problem becomes more challenging in many real applications where the data comes from multiple views, and some views may be irrelevant for distinguishing between majority and minority classes, such as synthetic ID detection and insider threat de...
Being excluded and ignored has been shown to threaten fundamental human needs and cause pain. Such reflexive reactions to social exclusion have been conceptualized as direct and unmoderated (temporal need threat model, Williams, 2009). Here we propose an extension and argue that reflexive reactions depend on how social exclusion situations are construed. If being excluded is understood as a vio...
Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework fi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید