[b]Abstract[/b]. The paper presents a concept of threat protection pairs as virtual elements of a structure of an object, to indicate its potential capacity to safeguard against specific risks. Neutrality of the pair occurs in a situation of full calm or full protection against the threat assigned to this situation. Degrees of the neutrality violation (defined by the probabilities) are the inputs to determine: the object security and the risk of servicing and risk of compensation for the downtime. It can be noted that the results of the work may be used for many other issues, e.g. to optimize the full conditional programs for diagnosing.[b]Keywords[/b]: threat protection pair, security, risk of servicing, risk of compensation for the downti...
The soft targets and crowded places are closely related with a high risk of the violent attack. Betw...
Systems of systems (SoS) have been introduced in early 1990s in air traffic control domain, defense ...
To carry out a complete security risk assessment, three fields must be taken into consideration, nam...
W pracy parami zagrożeniowo-ochronnymi są wirtualne elementy obiektu, rzutujące na jego zdolności oc...
In this report, a threat assessment algorithm for prioritisation of moving objects in a secure compo...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
The goal of this paper is to provide a mathematical threat modeling methodology and a threat risk as...
We describe a framework for risk assessment specifically within the context of risk-based access con...
The goal of this article was to present the issues connected with threats, identification and assess...
In the process of development of the security system of the information system, the risk assessment ...
Designing and improving the resilience of complex sociotechnical/cyber-physical systems is not a sim...
Security risk analysis is the term used to describe the analysis of critical facilities in which the...
A systematic integration of risk analysis and security testing allows for optimizing the test proces...
The soft targets are closely related with the risk of attack to the group of the people. This proble...
This article is focused on counter-terrorism measures. Our research is deal to Soft targets when we ...
The soft targets and crowded places are closely related with a high risk of the violent attack. Betw...
Systems of systems (SoS) have been introduced in early 1990s in air traffic control domain, defense ...
To carry out a complete security risk assessment, three fields must be taken into consideration, nam...
W pracy parami zagrożeniowo-ochronnymi są wirtualne elementy obiektu, rzutujące na jego zdolności oc...
In this report, a threat assessment algorithm for prioritisation of moving objects in a secure compo...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
The goal of this paper is to provide a mathematical threat modeling methodology and a threat risk as...
We describe a framework for risk assessment specifically within the context of risk-based access con...
The goal of this article was to present the issues connected with threats, identification and assess...
In the process of development of the security system of the information system, the risk assessment ...
Designing and improving the resilience of complex sociotechnical/cyber-physical systems is not a sim...
Security risk analysis is the term used to describe the analysis of critical facilities in which the...
A systematic integration of risk analysis and security testing allows for optimizing the test proces...
The soft targets are closely related with the risk of attack to the group of the people. This proble...
This article is focused on counter-terrorism measures. Our research is deal to Soft targets when we ...
The soft targets and crowded places are closely related with a high risk of the violent attack. Betw...
Systems of systems (SoS) have been introduced in early 1990s in air traffic control domain, defense ...
To carry out a complete security risk assessment, three fields must be taken into consideration, nam...