نتایج جستجو برای: threat

تعداد نتایج: 52909  

2004
Hasan Ulusoy

History shows that ‘security, whether defined narrowly or widely, is a scarce commodity’. Therefore, it is generally observed that in face of security threat perceptions, states feel the necessity to combine their efforts to strengthen their own security by acting together. This brings us to the concept of collective security, which has been widely debated in the literature of international rel...

2009
Björn Johnson

Innovative cities are essential for the economic growth and development of countries. At the same time, however, social and environmental problems related to city growth can be serious threats to the full realisation of the socio-economic contribution that cities can make. In this paper it is argued that the notion of a “system of innovation” is helpful in understanding the factors that shape t...

Journal: :Social cognitive and affective neuroscience 2012
Florian Bublatzky Harald T Schupp

Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAP...

Journal: :JoWUA 2014
David A. Mundie Samuel J. Perl Carly Huth J. D.

In a continued effort to better define the field of insider threat research, this study presents a survey of 30 cybersecurity experts’ opinions on the attributes of a prototypical insider and insider threat case. The survey is based on the attributes in the Entity-Relationship Model developed in a previous study of 42 different definitions of insider and insider threat. To develop clearer conse...

2007
Maria Nickolova Eugene Nickolov

This paper suggest a generic threat model for the processes in e-learning systems. After a breaf discussion of the particularities of e-learning systems from the security point of view, the role of threat models in system security is explained. Then a characterization of the attackers is made, together with the assets and entry points identification and threats identification and classification...

2015
Dawei Zhou Jingrui He K. Selçuk Candan Hasan Davulcu

Rare category detection refers to the problem of identifying the initial examples from underrepresented minority classes in an imbalanced data set. This problem becomes more challenging in many real applications where the data comes from multiple views, and some views may be irrelevant for distinguishing between majority and minority classes, such as synthetic ID detection and insider threat de...

2016
Selma C. Rudert Rainer Greifeneder Stefan Janke Selma Rudert

Being excluded and ignored has been shown to threaten fundamental human needs and cause pain. Such reflexive reactions to social exclusion have been conceptualized as direct and unmoderated (temporal need threat model, Williams, 2009). Here we propose an extension and argue that reflexive reactions depend on how social exclusion situations are construed. If being excluded is understood as a vio...

2015
Taolue Chen Florian Kammüller Ibrahim Nemli Christian W. Probst

Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework fi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید