-
As the responsible owner of the openETCS, I want to have a Hazard and Risk Analysis in order to be able to reuse the openETCS product.
-
Assessment and cheating constitutes an adversarial setting. It's thus suitable for security analysis. Then we must consider the risk that someone tries to cheat (and which method they use) to consider…
dbosk updated
7 years ago
-
🔍 Problem Description:
In the banking industry, it is critical to predict which customers are at risk of leaving to develop retention strategies and prevent revenue loss. This project, titled Custome…
-
1. FX Risk calculation for the company including an innovative dashboard that visually represents the company’s FX exposure and effectiveness of different hedging strategies.
a. Compute their static V…
-
# Notebook Review: Issue #259
**Submitting author:** @camappel
**Repository:** https://github.com/eds-book-gallery/95199651-9e81-4cae-a3a7-66398a9a5f62
**Notebook…
-
### Paper 정보
- https://www.tandfonline.com/doi/abs/10.1080/10920277.2019.1641416
- Eling and Schnell (2020).
- Citation: 26
### contributions
-
We should perform some type of basic checks across installed browser extensions to hunt for known-suspicious items or just perform a general review of installed extensions with associated metadata, ha…
-
Add the possibility to check the *security log* of important events involving a risk analysis.
Such as:
- risk analysis access log,
- modification of risks,
- any other important records to be log…
-
# Proposal: Proof-of-Consciousness Consensus Mechanism
**Summary:**
This proposal introduces a new consensus mechanism called Proof-of-Consciousness (PoC). Under PoC, only users who actively par…
-
### Before Creating the Bug Report
- [X] I found a bug, not just asking a question, which should be created in [GitHub Discussions](https://github.com/apache/rocketmq/discussions).
- [X] I have sear…