全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Antonio Robles-González , Javier Parra-Arnau , Jordi Forné
来源:[J].Computers & Security(IF 1.158), 2020Elsevier
摘要:... Privacy Threat Analysis (PTA) is one of the pillars for the required Privacy Impact Assessment (PIA). Among the few existing approaches for conducting a PTA, LINDDUN is a very promising framework, although generic, in the sense that it has not been specifically conceived for ...
作者:K. Tuma , G. Calikli , R. Scandariato
来源:[J].The Journal of Systems & Software(IF 1.135), 2018, Vol.144, pp.275-294Elsevier
摘要:Abstract(#br)Architectural threat analysis has become an important cornerstone for organizations concerned with developing secure software. Due to the large number of existing techniques it is becoming more challenging for practitioners to select an appropriate threat analysis te...
作者:Davor Kontić , Branko Kontić
来源:[J].Journal of Hazardous Materials(IF 3.925), 2008, Vol.163 (2), pp.683-700Elsevier
摘要:... Due to adaptations of the results of risk assessment, which are needed to make the risk assessment usable by land-use planners, we term the overall process threat analysis. The key features of the threat analysis can be summarised as follows. (i) It consists of three main ste...
作者:Zafar Iqbal , Zahid Anwar
来源:[J].Future Generation Computer Systems(IF 1.864), 2020, Vol.108, pp.687-708
摘要:Abstract(#br)Cyber Threat Management (CTM) involves prevention, detection, and response to cyber-attacks by identifying and understanding threats, and applying appropriate actions. This is not practical for an organization to perform these activities within the time-frame of...
作者:Bernhard Gibis , Justo Artiles , Paula Corabian ...
来源:[J].Health policy(IF 1.55), 2001, Vol.58 (1), pp.27-35Elsevier
摘要:... In a one-day workshop strengths, weaknesses, opportunities and threats (SWOT) analyses of HTA were conducted, first at a ‘global’ level, and then of the Estonian situation. The ‘global’ SWOT analysis yielded a large number of items that pertain to institutionalize...
作者:Corrado Battisti , Luca Luiselli , Daniele Pantano ...
来源:[J].Biodiversity and Conservation(IF 2.264), 2008, Vol.17 (6), pp.1529-1542Springer
摘要:Abstract(#br)Naming, listing and measuring human-induced threats in protected areas are crucial in conservation. Here, we defined a check-list of direct threats in a Mediterranean remnant wetland (central Italy), managed as nature reserve, grouping them according to a taxono...
作者:Elyes Ben Hamida , Hassan Noura , Wassim Znaidi
来源:[J].Electronics, 2015, Vol.4 (3), pp.380-423DOAJ
摘要:... However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secu...
作者:Radhika Brahme , Sheela Godbole , Raman Gangakhedkar ...
来源:[J].Indian Journal of Community Medicine, 2018, Vol.43 (2), pp.107-112Wolters Kluwer
摘要:... Methods: Mixed methods comprising of the key informant's interviews and structured data collected from field interviewers were used to do the strengths, weaknesses, opportunities, and threats analysis with defined attributes. Results: Despite the challenges, the technology u...
作者:Nambi Manavalan Rajan
来源:[J].Arabian Journal of Geosciences(IF 0.74), 2019, Vol.12 (14), pp.1-17Springer
摘要:... Most of the Indian sandalwood trees face survival threats due to anthropogenic causes and climate change in the future. This research focusses on identification of safer areas from anthropogenic threats due to access from road networks and settlements and also focusses on...
作者:Jonathan M. Hoekstra , Krista K. Bartz , Mary H. Ruckelshaus ...
来源:[J].Ecological Applications(IF 3.815), 2007, Vol.17 (7), pp.2061-2073Wiley
摘要:... We use this conceptual framework to quantify the relative importance of major threats to the current status of 201 Chinook populations. Current status is characterized by two demographic indices: population density and trend. We employ path analytic models and information th...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×