We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Risk

    Unwanted events, such as attempts to breach the security policy of an IT system, may appear with very different frequencies and have very different...
    Chapter 2024
  2. Managing Risk

    The field of security – and American regulation – realizes that not all organizations need the same level or type of security. Banks need more...
    Chapter 2024
  3. Maturing Ethical Risk

    The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects...
    Chapter 2024
  4. Financial Risk Management

    Similar to non-financial risk, financial risk is higher for cryptoassets than traditional investments. For example, as introduced in Chapter...
    Chapter 2023
  5. Risk and Compliance in Cybersecurity

    In the dynamic and ever-evolving landscape of digital technology, the importance of risk management in cybersecurity cannot be overstated. It acts as...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  6. Network Risk Assessment Method Based on Residual Risk Analysis

    The existing network security theory usually believes that “residual risks” are acceptable to a certain degree. However, the reality is that most...
    Hao **g, Peizhi Yan, ... Yige Fang in Internet of Things – ICIOT 2022
    Conference paper 2023
  7. Empirical Risk Minimization

    This video segment explains empirical risk minimization as a main paradigm for the design of ML methods.
    Video segment 2023
  8. Pattern-Based Risk Identification for Model-Based Risk Management

    In a previous publication, we have introduced Risk Issue Questionnaires (RIQs) that serve to support risk identification for critical systems. The...
    Chapter 2023
  9. Understanding Risk and Return

    Any financial asset is characterized by its risk and return. Return means the financial reward it brings, such as the percentage increase in the...
    Chapter 2023
  10. Risk Management

    AICA represent a unique opportunity to mitigate cybersecurity risks. This is because autonomous intelligent agents can defend a system against...
    Alexandre K. Ligo, Alexander Kott, ... Igor Linkov in Autonomous Intelligent Cyber Defense Agent (AICA)
    Chapter 2023
  11. Non-Financial Risk Management

    To make effective decisions, responsible investors should thoroughly understand financial and non-financial risks related to their investments. These...
    Chapter 2023
  12. Security and Risk Management

    In the ever-evolving landscape of information security, a solid grasp of Security and Risk Management principles is crucial for professionals in the...
    Mohamed Aly Bouke in CISSP Exam Certification Companion
    Chapter 2023
  13. An Opportunity-Based Approach to Information Security Risk

    The traditional approach to Information Security Risk Management (ISRM) is to assume that risk can only affect businesses negatively. However, it is...
    Dinh Uy Tran, Sigrid Haug Selnes, ... Janne Hagen in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  14. Fair Empirical Risk Minimization Revised

    Artificial Intelligence is nowadays ubiquitous, thanks to a continuous process of commodification, revolutionizing but also impacting society at...
    Danilo Franco, Luca Oneto, Davide Anguita in Advances in Computational Intelligence
    Conference paper 2023
  15. Information Technology in Disaster Risk Reduction 7th IFIP WG 5.15 International Conference, ITDRR 2022, Kristiansand, Norway, October 12–14, 2022, Revised Selected Papers

    This volume constitutes the refereed and revised post-conference proceedings of the 7th IFIP WG 5.15 International Conference on Information...
    Terje Gjøsæter, Jaziar Radianti, Yuko Murayama in IFIP Advances in Information and Communication Technology
    Conference proceedings 2023
  16. Disease Risk Predictions with Differentiable Mendelian Randomization

    Predicting future disease onset is crucial in preventive healthcare, yet longitudinal datasets linking early risk factors to subsequent health...
    Ludwig Gräf, Daniel Sens, ... Francesco Paolo Casale in Research in Computational Molecular Biology
    Conference paper 2024
  17. On the Semantics of Risk Propagation

    Risk propagation encompasses a plethora of techniques for analyzing how risk “spreads” in a given system. Albeit commonly used in technical...
    Mattia Fumagalli, Gal Engelberg, ... Giancarlo Guizzardi in Research Challenges in Information Science: Information Science and the Connected World
    Conference paper 2023
  18. Geolocation Risk Scores for Credit Scoring Models

    Customer location is considered as one of the most informative demographic data for predictive modeling. It has been widely used in various sectors...
    Erdem Ünal, Uğur Aydın, ... Mehmet Gönen in Machine Learning, Optimization, and Data Science
    Conference paper 2024
  19. Overstatement-Net-Equivalent Risk-Limiting Audit: ONEAudit

    A procedure is a risk-limiting audit (RLA) with risk limit \(\alpha \)...
    Conference paper 2024
  20. Information Technology in Disaster Risk Reduction 8th IFIP WG 5.15 International Conference, ITDRR 2023, Tokyo, Japan, December 4–6, 2023, Revised Selected Papers

    This volume constitutes the refereed and revised post-conference proceedings of the 8th IFIP WG 5.15 International Conference on Information...

    Julie Dugdale, Terje Gjøsæter, Osamu Uchida in IFIP Advances in Information and Communication Technology
    Conference proceedings 2024
Did you find what you were looking for? Share feedback.