Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Feb 13, 2024 · The first algorithm involves a simple manipulation of the Boolean expression, corresponding to the logic network and can be used for detecting all static-1 ...
Mar 2, 2024 · The framework consists of two main phases, (i) hazard identification and analysis through STPA, and (ii) generating risk models represented by Bayesian Belief ...
Sep 3, 2023 · Algorithm: Analyze relationships within a network to identify key nodes and dependencies. "Your network is your net worth." — Porter Gale. Networking ...
Missing: Technique Hazard
Jun 24, 2024 · A Hazard and Operability (HAZOP) study is a structured technique used to identify potential problems in processes. It involves dividing a system into nodes and ...
May 29, 2024 · In this study, based on historical mountain torrent hazards, a mountain torrent hazard prediction model was established by using Bayesian Model Average (BMA) ...
May 27, 2024 · hazard identification approach is divided into two parts: (1) Functional safety and (2) the SO-TIF aspect (incl. security). The basic scenario is considered ...
Apr 24, 2024 · This paper aims to accurately assess and effectively manage various security risks in the community and overcome the challenges faced by traditional models ...
May 25, 2024 · In essence, this algorithm assesses risks in functional scenarios by analyzing static element combinations and risky actions, generating a collection of ...
Feb 28, 2024 · The article also presents a novel comprehensive approach for quantifying risk assessment of organizational networks based on attack trees modified according to ...
Missing: Hazard | Show results with:Hazard