We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. Understand, Manage, and Measure Cyber Risk® Practical Solutions for Creating a Sustainable Cyber Program

    When it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner’s guide lays down those...
    Ryan Leirvik
    Book 2023
  2. Studying the impact of risk assessment analytics on risk awareness and code review performance

    While code review is a critical component of modern software quality assurance, defects can still slip through the review process undetected....

    Xueyao Yu, Filipe R. Cogo, ... Michael W. Godfrey in Empirical Software Engineering
    Article 17 February 2024
  3. Principles for Risk

    In today’s highly technological world, the risk is unavoidable. Therefore, handling risks correctly is paramount in all phases of develo** and...
    Chapter 2022
  4. A Methodology for Cybersecurity Risk Assessment in Supply Chains

    Supply chain cyberattacks are on the rise as attackers are increasingly exploiting the intricate network of supplier connections between companies....
    Betul Gokkaya, Leonardo Aniello, ... Basel Halak in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  5. Road Scene Risk Estimation Using Driving Video

    In this study, we propose a method for potential risk estimation of road scenes from driving videos and investigate the relationship between the...
    Masafumi Kishimoto, Masaaki Iiyama in Cross-Cultural Design
    Conference paper 2023
  6. Risk Management in the Design of Computer Network Topology

    The problems of risk management are considered from different points of view. Most often, they are investigated as part of organizational management....
    Conference paper 2024
  7. The Strategic Management of Disaster Risk Mitigation

    Systemic risks are embedded in the complex networks of an increasingly interconnected world. Achieving the Sendai Framework for Disaster Risk...
    Colin Eden, Jose J. Gonzalez in Information Technology in Disaster Risk Reduction
    Conference paper 2023
  8. Cyber Risk Assessment Approach in Connected Autonomous Vehicles

    The rise of automated technologies due to recent advances in Intelligent Transportation systems (ITS) from autonomous delivery services to physical...
    Marcielo Bell, June Wei, Guillermo Francia in Human-Centered Design, Operation and Evaluation of Mobile Communications
    Conference paper 2024
  9. Representing Cybersecurity Risk

    A picture is said to be worth a thousand words. The same can be said of a trend line. More precisely if less pithily, a trend line reveals how a...
    Carl S. Young in Cybercomplexity
    Chapter 2022
  10. Enterprise Cyber Risk Management as a Value Creator Leverage Cybersecurity for Competitive Advantage

    This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business...

    Bob Chaput
    Book 2024
  11. PRS-Net: Interpretable Polygenic Risk Scores via Geometric Learning

    Polygenic risk score (PRS) serves as a valuable tool for predicting the genetic risk of complex human diseases for individuals, playing a pivotal...
    Han Li, Jianyang Zeng, ... Sai Zhang in Research in Computational Molecular Biology
    Conference paper 2024
  12. Risk Stratification of Breast Cancer Patients: Integrating Epidemiology, Risk Factors, and Prognostic Markers for Sustainable Development

    The classification of breast cancer risk into high and low categories is essential for individualized treatment planning and enhanced patient...
    Rajan Prasad Tripathi, Sunil Kumar Khatri, ... Danish Ather in Sustainable Development through Machine Learning, AI and IoT
    Conference paper 2023
  13. Using Social Sensing to Validate Flood Risk Modelling in England

    Floods are amongst the most severe natural disasters. Accurate flood risk maps are vital for emergency response operations and long-term flood...
    Joshua Joyce, Rudy Arthur, ... Hywel Williams in AI 2023: Advances in Artificial Intelligence
    Conference paper 2024
  14. Risk-Aware Motion Planning for Very-Large-Scale Robotics Systems Using Conditional Value-at-Risk

    The field of Very-Large-Scale Robotics (VLSR) has garnered significant attention due to its ability to tackle complex and coordinated tasks. However,...
    Xuru Yang, Han Gao, ... Chang Liu in Intelligent Robotics and Applications
    Conference paper 2023
  15. RAFA Model. Rethinking Cyber Risk Management in Organizations

    In a highly volatile scenario such as the current one, current cyber risk management practices, based on standards and best practices, begin to lose...
    Conference paper 2024
  16. Product Incremental Security Risk Assessment Using DevSecOps Practices

    Security risk assessment is often a heavy manual process, making it expensive to perform. DevOps, that aims at improving software quality and speed...
    Sébastien Dupont, Artsiom Yautsiukhin, ... Philippe Massonet in Computer Security. ESORICS 2022 International Workshops
    Conference paper 2023
  17. Risk and artificial general intelligence

    Artificial General Intelligence (AGI) is said to pose many risks, be they catastrophic, existential and otherwise. This paper discusses whether the...

    Federico L. G. Faroldi in AI & SOCIETY
    Article Open access 09 July 2024
  18. Credit Risk Assessment - A Machine Learning Approach

    Banks are foregoing their present reserves for future sources of Revenue. This source is associated with a risk called credit default risk which...
    Thumpala Archana Acharya, Pedagadi Veda Upasan in Intelligent Systems and Machine Learning
    Conference paper 2023
  19. ANFIS for risk estimation in risk-based access control model for smart homes

    The risk-based access control model is one of the dynamic models that use the security risk as a criterion to decide the access decision for each...

    Hany F. Atlam, Gary B. Wills in Multimedia Tools and Applications
    Article Open access 04 October 2022
  20. Novel embeddings improve the prediction of risk perception

    We assess whether the classic psychometric paradigm of risk perception can be improved or supplanted by novel approaches relying on language...

    Zak Hussain, Rui Mata, Dirk U. Wulff in EPJ Data Science
    Article Open access 22 May 2024
Did you find what you were looking for? Share feedback.