نتایج جستجو برای: روش coras

تعداد نتایج: 369610  

2013
Sebastian Saal Dennis Klar Markus Seemann Michaela Huhn

Die CORAS-Methode [LSS11] unterstützt eine systematische, defensive Risikoanalyse, die insbesondere zur Ermittlung von IT-Security-Anforderungen eingesetzt wird. Sie ermöglicht eine Risikobeurteilung auf Basis einer Systemanalyse und der Identifikation der zu schützenden Werte. Dafür wird ein System schrittweise in sogenannten Bedrohungsdiagrammen auf Schwachstellen untersucht. Danach erfolgt d...

2011
Mass Soldal Lund Bjørnar Solhaug Ketil Stølen

Find loads of the model driven risk analysis the coras approach book catalogues in this site as the choice of you visiting this page. You can also join to the website book library that will show you numerous books from any types. Literature, science, politics, and many more catalogues are presented to offer you the best book to find. The book that really makes you feels satisfied. Or that's the...

2003
Glenn Munkvold Gry Seland Siv Hilde Houmb Sven Ziemer

Implementing generic standardized systems in local practices often imply a process of change involving people from various domains and communities. In this paper we put particular emphasise on the new emerging community of people this implies. Based on experience from the Software Engineering and HCI domain we discuss a methodology supporting these new challenges. We use Communities of Practice...

2004
Folker den Braber Mass Soldal Lund Ketil Stølen Fredrik Vraalsen

Security assessments are costly and time consuming and cannot be carried out from scratch each time a system is updated or modified. This motivates the need for specific methodology addressing the maintenance and reuse of assessment results in particular, and a component oriented approach to security assessment in general. Traditionally, system development methodologies focus on the development...

2012
Guillermo A. Francia

The nation's critical infrastructures, such as those found in Supervisory Control and Data Acquisition (SCADA) and industrial control systems (ICS), are increasingly at risk and vulnerable to internal and external threats. Security best practices on these systems come at a very opportune time. Further, the value of risk assessment of these systems is something that cannot just be relegated as i...

Journal: :Brain : a journal of neurology 2015
Guilherme Riccioppo Rodrigues Ludmyla Kandratavicius Jose Eduardo Peixoto-Santos Mariana Raquel Monteiro Ana Carolina Gargaro Camila de Vasconcelos Leite Geraldi Tonicarlo Rodrigues Velasco Joao Pereira Leite

Sir, We read with interest the study of Coras et al. (2014) reporting the absence of verbal anterograde episodic memory (AEM) impairment in patients with mesial temporal lobe epilepsy (MTLE) with a hippocampal sclerosis ILAE type 2 classification (HS ILAE 2, i.e. CA1 predominant cell loss). This finding may provide an anatomical basis for the dissociation of anterograde/long-term episodic memor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید