Search

Your search keyword '"security risk assessment"' showing total 208 results

Search Constraints

Start Over You searched for: Descriptor "security risk assessment" Remove constraint Descriptor: "security risk assessment"
208 results on '"security risk assessment"'

Search Results

2. How do professionals assess security risks in practice? An exploratory study.

3. Security Risk Assessment for Patient Portals of Hospitals: A Case Study of Taiwan

4. Ecological and geological security risk assessment of underground space development in cold and arid canyon cities—Taking Ping'an District, Haidong City, Qinghai Province, as an example.

5. A neuro-fuzzy security risk assessment system for software development life cycle

7. Early CSS Innovations in Risk Analysis

8. 基于AHP和FCE的桥梁无辅助墩顶推施工安全风险评估.

10. Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT.

11. Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities.

12. Security risk assessment and visualization study of key nodes of sea lanes: case studies on the Tsugaru Strait and the Makassar Strait.

13. A Network-Based Importance Measurement Index for Bridge Security Risk Assessment and Prioritisation

14. Improving cyber security in industrial control system environment

16. The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of G.E.'s intellectual transformation

17. Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases.

18. Security Risk Assessment for Trusted Chain Optimizing Based on Grey Fixed Weight Clustering.

19. FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems.

20. A Security Risk Assessment Method Based on Improved FTA-IAHP for Train Position System.

21. On the Automation of Security Testing for IoT Constrained Scenarios

23. Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model.

24. Lebanon's Single Most Destructive Explosion – Terrorists Plan to Copy and Provision against Such Accidents.

25. Information Security Risk Assessment

26. Assessment of Security Risks by FEMA and Fuzzy FEMA Methods, A Case Study: Combined Cycle Power Plant

27. Expert-Guided Security Risk Assessment of Evolving Power Grids.

28. Security Risk Level Prediction of Carbofuran Pesticide Residues in Chinese Vegetables Based on Deep Learning.

29. Risk Prediction of IoT Devices Based on Vulnerability Analysis.

30. Quantitative Evaluation Model for Information Security Risk of Wireless Communication Networks Under Big Data

31. Security Risk Assessment for Miniature Internet of Thing Systems with 5G

32. Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost

34. A NETWORK-BASED IMPORTANCE MEASUREMENT INDEX FOR BRIDGE SECURITY RISK ASSESSMENT AND PRIORITISATION.

35. Security Risk Assessment of Healthcare Web Application Through Adaptive Neuro-Fuzzy Inference System: A Design Perspective

36. CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure

37. Enhancing maritime transportation security: A data-driven Bayesian network analysis of terrorist attack risks.

38. Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities

39. Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT

40. A neuro-fuzzy security risk assessment system for software development life cycle.

41. A Survey of Cybersecurity Certification for the Internet of Things.

42. Information Security Risk Assessment.

43. A Method for Developing Qualitative Security Risk Assessment Algorithms

44. Sequential Pattern Mining for ICT Risk Assessment and Prevention

45. Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture

46. Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases

47. FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems

48. A model-based approach for self-adaptive security in CPS: Application to smart grids.

49. Information security risk assessment of industrial Internet of coal mine

50. Stochastic Security Assessment for Power Systems With High Renewable Energy Penetration Considering Frequency Regulation

Catalog

Books, media, physical & digital resources