Showing 1 - 10 of 10,252
Computers have always helped to amplify and propagate errors made by people. The emergence of Networked Information Systems (NISs), which allow people and systems to quickly interact worldwide, has made understanding and minimizing human error more critical. This paper applies concepts from...
Persistent link: https://www.econbiz.de/10009435568
model verification and validation, uncertainty quantification, and decision making. We present a framework that extends the … decision makers. This report provides an assessment of our thinking on ASC Verification and Validation, and argues for further …
Persistent link: https://www.econbiz.de/10009436233
Persistent link: https://www.econbiz.de/10013093151
existing methodologies that separately consider physical security and cyber security. This research has developed a risk … assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security …-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems …
Persistent link: https://www.econbiz.de/10009436110
. The hardened workstations then accessed the business system through the Citrix Secure ICA client. How these security …
Persistent link: https://www.econbiz.de/10009436886
system that we use to detect security events. It gives the viewpoint of a team directly responsible for developing and …, privacy considerations, legal issues, and system integrity. Our experiences are of general interest both to security … professionals and to anyone who may wish to implement a similar system. While NADIR investigates security events, the methods used …
Persistent link: https://www.econbiz.de/10009436980
A new strategy for validation of hydrocode predictions through the Bayesian analysis of radiographic data is presented … provides the foundation for assessing the reliability of the results. We propose using the hydrocode prediction at radiographic … that a physics-based validation of hydrocodes themselves may require some, if not all, of the basic concepts presented here …
Persistent link: https://www.econbiz.de/10009436733
In two particular respects (briefly investigated in this study from a lawyer`s perspective), electric utilities appear uniquely well-positioned to contribute to the National Information Infrastructure (NII). First of all, utilities have legal powers derived from their charters and operating...
Persistent link: https://www.econbiz.de/10009435853
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the … National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security … criteria, and a development schedule.The purpose of the NSPP is to promote national security technologies through business …
Persistent link: https://www.econbiz.de/10009435489
Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security … important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects …
Persistent link: https://www.econbiz.de/10009436539