0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Information Technology Risk Management Model for Remote Control Vehicles
Authors :
Hamid Reza Naji
1
Aref Ayati
2
1- دانشگاه تحصیلات تکمیلی صنعتی و فناوری پیشرفته
2- دانشگاه تحصیلات تکمیلی صنعتی و فناوری پیشرفته
Keywords :
Risk Management،RCV،Drone،UAV،Cyber Security
Abstract :
This paper presents a lightweight and quick IT risk management model for Remote Control Vehicles (RCVs). The increasing use of RCVs in many fields and the existence of different threats are the main reasons for having an efficient risk management method in this field. This paper will cover the information technology risks based on a continuous, iterative, and cyclic flow. This structure is adaptable to agile methods and decreases the chance of losing data, failing any equipment or system, and losing the reputation of the enterprise. Our risk management model is based on qualitative measures and can cover most IT-based risks in this area
Papers List
List of archived papers
Embedding-Consistent Contrastive Learning: A Robust Approach for Imbalanced Classification
Sobhan Siamak - Eghbal Mansoori
Predicting Concentration of Particulate Matter (PM2.5) in Hamedan using Machine Learning Algorithms
Anita Karim Ghassabpour - Hatam Abdoli - Muharram Mansoorizadeh - Saeid Seyedi
هوشمندسازی پایش کیفیت رنگزنی داخلی گرین تایر و تحلیل داده برای بهینه سازی عمر بلادر، مصرف رنگ و ریشه یابی عیوب پخت
سامان ثنایی - رضا رحیمی
Enhancing Software Effort Estimation with an Integrated Approach of Particle Swarm Optimization and Genetic Algorithms in Analogy-based Method
Ehsan Nasr - Keyvan Mohebbi
Reinforced Detection: Deep Reinforcement Learning for Binary VoIP Classification in Encrypted Traffic
Mohsen Rajabpour - Mohammadmoein Asefi - Siavash Khorsandi
Agentic Username Suggestion and Multimodal Gender Detection in Online Platforms: Introducing the PNGT-26K Dataset
Farbod Bijary - Mohsen Ebadpour - Amirhosein Tajbakhsh
Wireless Virtual-Reality by considering Hybrid Beamforming in IEEE802.11ay standard
Nasim Alikhani - Abbas Mohammadi
Statistical distance-base acceptance strategy for desirable offers in bilateral automated negotiation
Arash Ebrahimnezhad - Dr Hamid Jazayeriy - Dr Faria Nassiri-mofakham
یک سیستم پاسخ به نفوذ در شبکه های اینترنت اشیاء با استفاده از شبکه های مبتنی بر نرم افزار
احسان شاهرخی مینا - رضا محمدی - محمد نصیری
Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G
Dhruvi Pancholi - Nilesh Kumar Jadav - Sudeep Tanwar - Deepak Garg - S. Mohammadali Zanjani
more
Samin Hamayesh - Version 42.5.2