intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Threat model

Xem 1-20 trên 94 kết quả Threat model
  • Hepatocellular carcinoma (HCC) presents a significant threat to individuals and healthcare systems due to its high recurrence rate. Accurate prognostic models are essential for improving patient outcomes. This study aimed to investigate the predictive value of the GGT to PA ratio (GPR) and to construct prognostic nomograms for HCC patients without microvascular invasion.

    pdf12p vikoch 27-06-2024 1 1   Download

  • Ebook "Climate change and food security: Adapting agriculture to a warmer world" aims to resolve some of the controversy by exploring and comparing the different methodologies and data that scientists use to understand climate’s effects on food security. In explains the nature of the climate threat, the ways in which crops and farmers might respond, and the potential role for public and private investment to help agriculture adapt to a warmer world.

    pdf201p giangdongdinh 28-05-2024 2 1   Download

  • The Mekong deltaic coasts have suffered from erosion and mangrove losses due to many relative threats in human activities, bringing to coastal instabilities. The massive and large number of constructions, such as sea dikes, revetments, and sea walls, tend to break the equilibrium in multiple locations along the coasts. As a result, a significant reduction of mangroves comes along in qualitative and quantitative variations, for example, the number of trees in one location and the healthy width of mangroves.

    pdf13p dianmotminh02 03-05-2024 1 1   Download

  • Forest fires present a significant threat to the tropical forest ecosystem in the northwestern region of Vietnam. Our study aimed to assess the impacts of environmental factors on forest fire occurrence and to map forest fire probability for the whole region. The forest fire occurrence data over the period 2003–2016, environmental factors (climate, fuel condition, topography, and human activity), and the MaxEnt approach were used for this study.

    pdf21p dianmotminh02 03-05-2024 4 2   Download

  • Wildlife conservation is a pressing global concern, with the need to create and manage protected areas where multiple species can coexist without facing the threat of extinction. In this paper, we proposed an Agent-Based Model that simulates the interactions and life activities of tigers, leopards, and wild boars within a 400 km2 area, approximately the area of standard conservation.

    pdf8p vibego 02-02-2024 1 0   Download

  • Ebook "Systems biology of marine ecosystems" describes the latest advances in systems biology in four plant-based marine ecosystems: seaweeds, seagrasses, microalgae, and corals. Marine organisms that inhabit the oceanic environment experience a diverse range of environmental fluctuations, anthropogenic stress, and threats from invasive species and pathogens.

    pdf355p lucchinguyen 28-12-2023 4 2   Download

  • Part 1 of ebook "The car hacker's handbook: A guide for the penetration tester" provides readers with contents including: Chapter 1 - Understanding threat models; Chapter 2 - Bus protocols; Chapter 3 - Vehicle communication with SocketCAN; Chapter 4 - Diagnostics and logging; Chapter 5 - Reverse engineering the CAN bus; Chapter 6 - ECU hacking;...

    pdf164p dangsovu 20-10-2023 5 3   Download

  • Lung cancer is a major global threat to public health for which a novel predictive nomogram is urgently needed. Non-small cell lung cancer (NSCLC) which accounts for the main port of lung cancer cases is attracting more and more people’s attention.

    pdf15p vioracle 29-09-2023 6 2   Download

  • Ebook Router security strategies: Securing IP network traffic planes – Part 1 includes contents: Chapter 1 Internet protocol operations fundamentals, Chapter 2 Threat models for IP networks, Chapter 3 IP network traffic plane security concepts, Chapter 4 IP data plane security, Chapter 5 IP control plane security, Chapter 6 IP management plane security, Chapter 7 IP services plane security.

    pdf425p haojiubujain06 05-09-2023 6 3   Download

  • Ebook "Security concepts" includes contents: Metadata, security properties, security models, security concepts, economics of security, adversary modeling, threat modeling, physical security, hardware security, distributed systems, identification and authentication, authorization - access control, secure system administration, logging, reporting, abuse detection, abuse response, forensics, privacy, intrusion response, network security, email security, web security, software security, human factors and usability, attack patterns, trust and personnel security, cryptography, randomness and unpr...

    pdf246p haojiubujain06 05-09-2023 3 2   Download

  • Ebook Cyber adversary characterization - Auditing the hacker mind part 2 includes contents: Chapter 6 bringing it all together: completing the cyber adversary model, chapter 7 warmtouch: assessing the insider threat and relationship management, chapter 8 managing the insider threat, chapter 9 the cyber adversary in groups: targeting nations' critical infrastructures, chapter 10 characterizing the extremes-terrorists and nation states, chapter 11 conclusions, chapter 12 return on investment.

    pdf190p haojiubujain06 05-09-2023 5 2   Download

  • Wildfires are considered one of the most common hazards in mountainous areas, posing a serious threat to flora, fauna, and humans. This article focuses on building a forest fire risk map based on GIS techniques in the southwest area of Ky Son district, Nghe An province.

    pdf12p viengels 25-08-2023 4 3   Download

  • Ebook Strategic management: An integrated approach (10th edition) - Part 2 includes contents: Chapter 1 strategic leadership: managing the strategy-making process for competitive advantage; chapter 2 external analysis: the identification of opportunities and threats; chapter 3 internal analysis: distinctive competencies, competitive advantage, and profitability; chapter 4 building competitive advantage through functional-level strategy; chapter 5 building competitive advantage through business-level strategy; chapter 6 business-level strategy and the industry environment;…

    pdf434p haojiubujain02 03-07-2023 6 2   Download

  • For early detection and response to network threats, a network intrusion detection system should be executed on a data plane. However, due to high model complexity, an intrusion detection model based on advanced machine learning techniques becomes unsuitable for limited-resource switches.

    pdf15p viargus 20-02-2023 5 2   Download

  • Continued part 1, part 2 of ebook "Advances in time series data methods in applied economic research: International Conference on Applied Economics (ICOAE) 2018" provide readers with content about: revealed comparative advantage BRICS-EU 28 - some new evidence; the effect of a sovereign credit rating change on share prices of the South African retail banks; impact of macro-economic variables on exchange rate - an evidence from Pakistan; the potential threat of corporate financial distress in Switzerland;...

    pdf289p damtuyetha 16-02-2023 4 2   Download

  • This thesis provides a first step towards understanding how fear of crime, perceived risk, perceptions of unsafety, and avoidance behavior reciprocally and positively influence each other; and how personal characteristics and community-related factors influence threat of victimization within a nonrecursive frame of reference, laying the groundwork and advancing conceptual foundations upon which threat of victimization can be assessed.

    pdf270p runthenight04 02-02-2023 3 2   Download

  • The traditional method to evaluate the feasibility of IVR-ERVC strategy is based on the steady state of the molten pool. But in the early stage, the transient behavior of the molten corium may impose a greater threat to the integrity of the reactor pressure vessel.

    pdf7p vironald 15-12-2022 11 5   Download

  • The World Health Organization (WHO) requires reduction in the prevalence of hepatitis B virus (HBV) surface antigen (HBsAg) in children to 0.1% by 2030, a key indicator for eliminating viral hepatitis as a major public health threat.

    pdf10p viferrari 28-11-2022 7 2   Download

  • To compare an autoregressive integrated moving average (ARIMA) model with a model that combines ARIMA with the Elman recurrent neural network (ARIMA-ERNN) in predicting the incidence of pertussis in mainland China. Background: The incidence of pertussis has increased rapidly in mainland China since 2016, making the disease an increasing public health threat.

    pdf11p viferrari 28-11-2022 8 2   Download

  • A coursebook: Exploring Pragmatics - Part 2 has present the content incitement in legal discourse; verbal irony; a pragmatic model of verbal parody; threats and impoliteness; speech act stage metaphor; pragmatics and behavioral game theory; clinical pragmatics revisited; pragmatic disorders in schizophrenia;...

    pdf268p chenlinong_0310 23-02-2022 15 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2