We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Yet another cybersecurity risk assessment framework

    IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in...

    Mathias Ekstedt, Zeeshan Afzal, ... Robert Lagerström in International Journal of Information Security
    Article Open access 14 July 2023
  2. A global scale comparison of risk aggregation in AI assessment frameworks

    AI applications bear inherent risks in various risk dimensions, such as insufficient reliability, robustness, fairness or data protection. It is...

    Anna Schmitz, Michael Mock, ... Maximilian Poretschkin in AI and Ethics
    Article Open access 06 May 2024
  3. Enterprise Cyber Risk Management as a Value Creator

    Over the last 40 years, I’ve enjoyed hel** organizations comply with various privacy, security, and breach notification regulations and standards...
    Chapter 2024
  4. Based on the Improved AHP Algorithm in the Corrosion Risk Assessment of Gas Pipelines

    Risk assessment plays a very important role in the safety management of gas pipelines, but there is a problem that the pipeline corrosion risk...
    Meili Liu, Tao Yan, ... **aoxu Chen in Proceedings of Innovative Computing 2024, Vol. 4
    Conference paper 2024
  5. Dynamic Data-Driven Downscaling to Quantify Extreme Rainfall and Flood Loss Risk

    The adverse socio-economic effects of natural hazards will likely worsen under climate change. Modeling their risk is essential to develo**...
    Anamitra Saha, Joaquin Salas, Sai Ravela in Dynamic Data Driven Applications Systems
    Conference paper 2024
  6. Understand, Manage, and Measure Cyber Risk Practical Solutions for Creating a Sustainable Cyber Program

    When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide...
    Ryan Leirvik
    Book 2022
  7. Cross-Border Data Security from the Perspective of Risk Assessment

    In the cross-border process of data, major issues such as national security and personal information security caused by complex processes and...
    Na Wang, Gaofei Wu, ... Yuqing Zhang in Information Security Practice and Experience
    Conference paper 2023
  8. Study on Credit Risk Control by Variational Inference

    This paper presents the development of an intelligent, machine learning-based Markov chain model to investigate loan risk and strategies for...
    Kun Wang, Ang Li, ... Lili Sun in Web Information Systems Engineering – WISE 2023
    Conference paper 2023
  9. Mining Risk Rules in Insurance Business Data Based on SPRINT Classification Algorithm

    SPRINT classification algorithm is based on SPRINT classification algorithm to mine risk rules in insurance business data. Mining risk rules in...
    Wenqian Wang, MengMeng Jiang in Proceedings of Innovative Computing 2024, Vol. 3
    Conference paper 2024
  10. Automatic Bleeding Risk Rating System of Gastric Varices

    An automated bleeding risk rating system of gastric varices (GV) aims to predict the bleeding risk and severity of GV, in order to assist...
    Conference paper 2023
  11. Trustworthy Academic Risk Prediction with Explainable Boosting Machines

    The use of predictive models in education promises individual support and personalization for students. To develop trustworthy models, we need to...
    Vegenshanti Dsilva, Johannes Schleiss, Sebastian Stober in Artificial Intelligence in Education
    Conference paper 2023
  12. Prediction of At-Risk Students Using Learning Analytics: A Literature Review

    Early identification of at-risk students has been recognised as being of the utmost importance for the provision of timely support. Despite the...
    Kam Cheong Li, Billy T. M. Wong, Hon Tung Chan in Technology in Education. Innovative Practices for the New Normal
    Conference paper 2024
  13. Machine Learning for Forest Fire Risk and Resilience

    Machine learning (ML) is currently the most promising and widely adopted technology in the geospatial industry. With the explosion of spatial data...
    Smita Varma, Soumendu Shekar Roy, Praveen Kumar Rai in Geospatial Technology to Support Communities and Policy
    Chapter 2024
  14. AI risk assessment using ethical dimensions

    In the design, development, and use of artificial intelligence systems, it is important to ensure that they are safe and trustworthy. This requires a...

    Alessio Tartaro, Enrico Panai, Mariangela Zoe Cocchiaro in AI and Ethics
    Article 03 January 2024
  15. Information Technology in Disaster Risk Reduction 6th IFIP WG 5.15 International Conference, ITDRR 2021, Morioka, Japan, October 25–27, 2021, Revised Selected Papers

    This volume constitutes the refereed and revised post-conference proceedings of the 6th IFIP WG 5.15 International Conference on Information...

    Jun Sasaki, Yuko Murayama, ... Plamena Zlateva in IFIP Advances in Information and Communication Technology
    Conference proceedings 2022
  16. Understanding Researcher Risk and Safety in Qualitative Research Online

    In this reflective essay, we seek to advance our understanding about the risk and safety of the researcher within the changing landscape of academia...

    Aya Yadlin, Ruth Tsuria, Asaf Nissenbaum in Digital Society
    Article Open access 01 February 2024
  17. Safety, Security, and Risk

    The main properties of trustworthy cyber-physical systems are safety and security. Both safety and security are the results of careful, responsible,...
    Chapter 2022
  18. Cyber Incidents Risk Assessments Using Feature Analysis

    There are a variety of approaches, methods and techniques that organisations use to manage and contain the risk underlying Cybersecurity incidents...

    Benjamin Aziz, Alaa Mohasseb in SN Computer Science
    Article 15 November 2023
  19. Configuring and Validating Multi-aspect Risk Knowledge for Industry 4.0 Information Systems

    Industry 4.0 information systems support production stakeholders in configuring and debugging increasingly flexible Cyber-Physical Production Systems...
    Stefan Biffl, Sebastian Kropatschek, ... Arndt Lüder in Advanced Information Systems Engineering
    Conference paper 2024
  20. On the Usage of NLP on CVE Descriptions for Calculating Risk

    In order to conduct a risk analysis on an ecosystem the potential threats to its assets must first be identified. The Risk Modelling Tool (RMT) of...
    Thrasyvoulos Giannakopoulos, Konstantinos Maliatsos in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
Did you find what you were looking for? Share feedback.