A model-based semi-quantitative approach for evaluating security of enterprise networks

Author(s):  
Zonghua Zhang ◽  
Farid Naït-Abdesselam ◽  
Xiaodong Lin ◽  
Pin-Han Ho
2010 ◽  
Vol 41 (3) ◽  
pp. 307-338 ◽  
Author(s):  
João Porto de Albuquerque ◽  
Heiko Krumm ◽  
Paulo Lício de Geus ◽  
René Jeruschkat

2009 ◽  
Vol 74 (4) ◽  
pp. 691-707 ◽  
Author(s):  
David A. Phillips

Qualitative models are unable to explain the known variability in the adoption and intensification of agriculture in the prehistoric North American Southwest. Adoption of a quantitative approach (specifically, a model based on marginal costs and benefits) better accounts for that variability.


2021 ◽  
Author(s):  
Anita Nair

<div>As organizations move most of their workloads to public cloud and remote work becomes more</div><div>prevalent today, enterprise networks become more exposed to threats both from inside and outside</div><div>the organization. The traditional Perimeter Security Model assumes that threats are always from the</div><div>outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and</div><div>software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,</div><div>which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates</div><div>and evaluates the model based on the various implementations by the leading industry players like</div><div>Google and Microsoft.</div>


Author(s):  
Ana Paula Silva de Andrade ◽  
Cleci Grzebieluckas Correio

Brazilian law considers areas around watercourses as Áreas de Preservação Permanente (APP) (Permanent Preservation Areas), which should be restored in case of degradation. This study aimed to present a plant recovery model based on Replacement Cost Method for an 11.7 hectares PPA, near the Water Treatment Station (WTS) of Tangará da Serra - MT. The research presents an applied nature, quantitative approach and structured script as a collection instrument, analyzed through the Replacement Cost Method (RCM), in order to estimate the recovery costs. The environmental diagnosis of the area showed the need for densified planting, at an estimated cost of R$ 24,492.00, with the greatest cost impact concentrated in implementation phase.


2021 ◽  
Author(s):  
Anita Nair

<div>As organizations move most of their workloads to public cloud and remote work becomes more</div><div>prevalent today, enterprise networks become more exposed to threats both from inside and outside</div><div>the organization. The traditional Perimeter Security Model assumes that threats are always from the</div><div>outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and</div><div>software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,</div><div>which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates</div><div>and evaluates the model based on the various implementations by the leading industry players like</div><div>Google and Microsoft.</div>


2020 ◽  
Vol 43 ◽  
Author(s):  
Peter Dayan

Abstract Bayesian decision theory provides a simple formal elucidation of some of the ways that representation and representational abstraction are involved with, and exploit, both prediction and its rather distant cousin, predictive coding. Both model-free and model-based methods are involved.


2001 ◽  
Vol 7 (S2) ◽  
pp. 578-579
Author(s):  
David W. Knowles ◽  
Sophie A. Lelièvre ◽  
Carlos Ortiz de Solόrzano ◽  
Stephen J. Lockett ◽  
Mina J. Bissell ◽  
...  

The extracellular matrix (ECM) plays a critical role in directing cell behaviour and morphogenesis by regulating gene expression and nuclear organization. Using non-malignant (S1) human mammary epithelial cells (HMECs), it was previously shown that ECM-induced morphogenesis is accompanied by the redistribution of nuclear mitotic apparatus (NuMA) protein from a diffuse pattern in proliferating cells, to a multi-focal pattern as HMECs growth arrested and completed morphogenesis . A process taking 10 to 14 days.To further investigate the link between NuMA distribution and the growth stage of HMECs, we have investigated the distribution of NuMA in non-malignant S1 cells and their malignant, T4, counter-part using a novel model-based image analysis technique. This technique, based on a multi-scale Gaussian blur analysis (Figure 1), quantifies the size of punctate features in an image. Cells were cultured in the presence and absence of a reconstituted basement membrane (rBM) and imaged in 3D using confocal microscopy, for fluorescently labeled monoclonal antibodies to NuMA (fαNuMA) and fluorescently labeled total DNA.


Author(s):  
Charles Bouveyron ◽  
Gilles Celeux ◽  
T. Brendan Murphy ◽  
Adrian E. Raftery

Sign in / Sign up

Export Citation Format

Share Document