Sökning: "Threat Modeling"
Visar resultat 1 - 5 av 35 avhandlingar innehållade orden Threat Modeling.
1. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles
Sammanfattning : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. LÄS MER
2. Efficiency and Automation in Threat Analysis of Software Systems
Sammanfattning : Context: Security is a growing concern in many organizations. Industries developing software systems plan for security early-on to minimize expensive code refactorings after deployment. In the design phase, teams of experts routinely analyze the system architecture and design to find potential security threats and flaws. LÄS MER
3. Spatial Analysis and Modeling for Health Applications
Sammanfattning : Despite the benefits of applying methods of geographic information science (GIScience), the use of such methods in health service planning and provision remains greatly underutilized. Spread of epidemic diseases is a constant threat to mankind and the globalization of the world increases the risk for global attacks from multi-resistant bacteria or deadly virus strains. LÄS MER
4. Pharmacokinetic-Pharmacodynamic modeling and prediction of antibiotic effects
Sammanfattning : Problems of emerging antibiotic resistance are becoming a serious threat worldwide, and at the same time, the interest to develop new antimicrobials has declined. There is consequently a need for efficient methods to develop new treatments that minimize the risk of resistance development and that are effective on infections caused by resistant strains. LÄS MER
5. Towards Efficiency and Quality Assurance in Threat Analysis of Software Systems
Sammanfattning : Context: Security threats have been a growing concern in many organizations. Organizations developing software products strive to plan for security as soon as possible to mitigate such potential threats. LÄS MER