Entity

Time filter

Source Type

Florida, NY, United States

Zhang L.,China Information Technology Security Evaluation Center | Peng J.,CyberVision | Du Y.,China Information Technology Security Evaluation Center | Wang Q.,China Information Technology Security Evaluation Center
Qinghua Daxue Xuebao/Journal of Tsinghua University | Year: 2012

Information security risk assessments are the prerequisite and basis of effective information system security. This article gives a general description of risk assessment methods and four improved assessment methods based on an analysis of the analytic hierarchy processes. This paper compares these methods to show the advantages and disadvantages of these methods. Source


Trademark
CyberVision | Date: 2016-06-15

Audio-video receivers; Audio speakers; Battery chargers; Closed circuit TV systems for security and surveillance, namely, cameras, switchers, monitors, microphones, and recorders; Computer network adapters, switches, routers and hubs; Digital media receivers; Electrical adapters; Electrical switches; Electronic devices for locating and tracking children, people, pets, using radio frequency, global positioning systems, cellular communication; Ethernet adapters; Hard disk drives (HDD); Liquid crystal displays; Power adapters; Signal splitters for electronic apparatus; USB charging ports; Wearable activity trackers; Wireless indoor and outdoor speakers.


Trademark
CyberVision | Date: 2010-10-27

Electronic publications, namely, books featuring educational subject matter in the field of social studies recorded on computer media. Electronic publishing services, namely, publication of text and graphic works of others on computer media, featuring social studies; book publishing.


Kaa

Trademark
CyberVision | Date: 2016-04-26

downloadable client-server computer software framework for managing connected applications and connected devices, and enabling interactions across them.


Kaa

Trademark
CyberVision | Date: 2014-07-03

downloadable client-server computer software framework for managing connected applications and connected devices, and enabling interactions across them.

Discover hidden collaborations