Academic literature on the topic 'Graph-based assessment system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Graph-based assessment system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Graph-based assessment system"
Zougari, Soundous, Mariam Tanana, and Abdelouahid Lyhyaoui. "Graph based Hybrid Assessment System for Programming Assignments." International Journal of Computer Applications 178, no. 14 (2019): 56–60. http://dx.doi.org/10.5120/ijca2019918929.
Full textPetnga, Leonard. "Graph‐based Assessment and Analysis of System Architecture Models." INCOSE International Symposium 29, no. 1 (2019): 922–36. http://dx.doi.org/10.1002/j.2334-5837.2019.00644.x.
Full textZhang, Zizhao, Yiwen Chen, Xinyue Yang, Liping Sun, and Jichuan Kang. "Risk assessment for autonomous navigation system based on knowledge graph." Ocean Engineering 313 (December 2024): 119648. http://dx.doi.org/10.1016/j.oceaneng.2024.119648.
Full textZhang, Fu Chao, and Jia Dong Huang. "Power System Cascading Failure Risk Assessment Model Based on Graph Theory." Applied Mechanics and Materials 496-500 (January 2014): 2844–47. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2844.
Full textZhang, Jun, Chen Zhang, Xinyang Han, et al. "A knowledge graph-based method for intelligent risk assessment of power grid." Journal of Physics: Conference Series 2914, no. 1 (2024): 012016. https://doi.org/10.1088/1742-6596/2914/1/012016.
Full textLi, Yunpeng, and Xi Li. "Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model." Scientific Programming 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9921731.
Full textYang, Jinwei, Yu Yang, Lu Zheng, Ruixia Cheng, and Shengnan Lin. "Network Security Situation Assessment Based on Attack Graph Techniques." Journal of Physics: Conference Series 2310, no. 1 (2022): 012071. http://dx.doi.org/10.1088/1742-6596/2310/1/012071.
Full textLiu, Chenchen, Hongwei Wang, and Lin Wang. "Intelligent Technology Assessment of High-Speed Railway Based on Knowledge Graphs." Advances in Engineering Technology Research 9, no. 1 (2024): 396. http://dx.doi.org/10.56028/aetr.9.1.396.2024.
Full textChen, Lu, Tao Zhang, Yuanyuan Ma, et al. "A Bayesian-Attack-Graph-Based Security Assessment Method for Power Systems." Electronics 13, no. 13 (2024): 2628. http://dx.doi.org/10.3390/electronics13132628.
Full textGrundspenkis, Janis, and Maija Strautmane. "Usage of Graph Patterns for Knowledge Assessment Based on Concept Maps." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (2009): 60–71. http://dx.doi.org/10.2478/v10143-009-0005-y.
Full textDissertations / Theses on the topic "Graph-based assessment system"
Batmaz, Firat. "Semi-Automatic assessment of students' graph-based diagrams." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/8431.
Full textSammarco, John J. "A normal accident theory-based complexity assessment methodology for safety-related embedded computer systems." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3171.
Full textBoudermine, Antoine. "A dynamic attack graphs based approach for impact assessment of vulnerabilities in complex computer systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT046.
Full textBook chapters on the topic "Graph-based assessment system"
Ye, Hongbo, Kexiang Qian, Minghui Jin, Xiao Han, and Fei Xiao. "Risk Assessment Method of Power Monitoring System Vulnerability Based on Attack Graph." In Lecture Notes in Electrical Engineering. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8430-2_10.
Full textBourezg, Abdrabbi, and Hamid Bentarzi. "Graph Theory Based Reliability Assessment Software Program for Complex Systems." In Springer Series in Reliability Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31375-3_6.
Full textKoufos, Ioannis, Maria Christopoulou, George Xilouris, Michael-Alexandros Kourtis, Maria Souvalioti, and Panagiotis Trakadas. "Towards the Automation of Attack Graph-Based Risk Assessment with OSCAL." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76459-2_30.
Full textGutiérrez-Batista, Karel, Diego Rincon-Yanez, and Sabrina Senatore. "Human-Oriented Fuzzy-Based Assessments of Knowledge Graph Embeddings for Fake News Detection." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-73997-2_10.
Full textCui, Ying, Yishi Liu, Yancong Li, and Zixuan Huang. "Risk Assessment of Security Assets for Networked Swarm Systems Based on Time Series Decomposition of Temporal Knowledge Graph." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-3336-1_24.
Full textVillazon-Terrazas, Boris, Nuria Garcia-Santa, Beatriz San Miguel, et al. "Fujitsu HIKARI, a Healthcare Decision Support System based on Biomedical Knowledge." In Research Anthology on Decision Support Systems and Decision Management in Healthcare, Business, and Engineering. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-9023-2.ch028.
Full textJabari, Farkhondeh, Heresh Seyedia, Sajad Najafi Ravadanegh, and Behnam Mohammadi Ivatloo. "Stochastic Contingency Analysis Based on Voltage Stability Assessment in Islanded Power System Considering Load Uncertainty Using MCS and k-PEM." In Advances in Computer and Electrical Engineering. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9911-3.ch002.
Full textToropov, Andrey A., Alla P. Toropova, Emilio Benfenati, et al. "QSPR/QSAR Analyses by Means of the CORAL Software." In Quantitative Structure-Activity Relationships in Drug Design, Predictive Toxicology, and Risk Assessment. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8136-1.ch015.
Full textSanctorum, Audrey, Jan Maushagen, Sara Sepehri, et al. "Knowledge Management in the Context of Toxicity Testing." In From Theory of Knowledge Management to Practice [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.1002341.
Full textBansal, Garima. "Competency-Based Assessments in STEM Classrooms." In Fostering Science Teaching and Learning for the Fourth Industrial Revolution and Beyond. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6932-3.ch003.
Full textConference papers on the topic "Graph-based assessment system"
Chen, Xin, Chuantao Yin, Hui Chen, Wenge Rong, Yuanxin Ouyang, and Yanmei Chai. "Course Recommendation System Based on Course Knowledge Graph Generated by Large Language Models." In 2024 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE). IEEE, 2024. https://doi.org/10.1109/tale62452.2024.10834324.
Full textDong, Xin, Wenjuan Du, Qiang Fu, and Haifeng Wang. "Stability Assessment of Renewable Power System Subsynchronous Oscillation Based on Domain Adversarial Graph Convolutional Network." In 2024 3rd Asian Conference on Frontiers of Power and Energy (ACFPE). IEEE, 2024. https://doi.org/10.1109/acfpe63443.2024.10800863.
Full textDeng, Xin, Rui Wang, Weihong Han, and Zhihong Tian. "Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00049.
Full textShao, Chong, Xin He, Lili Ma, Hongsheng Wang, Chen Zhou, and Haiying Dong. "Transient Assessment of Power Systems Based on Graph Attention Networks." In 2024 IEEE 5th International Conference on Advanced Electrical and Energy Systems (AEES). IEEE, 2024. https://doi.org/10.1109/aees63781.2024.10872477.
Full textReddy M, Hareesh Kumar, and Vignesh V. "Graph Theoretic Approach Based Cyber Contingency Assessment of Smart Power Grids." In 2024 23rd National Power Systems Conference (NPSC). IEEE, 2024. https://doi.org/10.1109/npsc61626.2024.10987186.
Full textAvramenko, Vladimir, Igor Kotenko, Andrey Kozlenko, and Igor Saenko. "A Graph-Based Approach to Quantitative Assessment Information Security in Distributed Computing Systems." In 2025 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE, 2025. https://doi.org/10.1109/usbereit65494.2025.11054113.
Full textVillani, Maria Luisa, Sonia Giovinazzi, and Maurizio Pollino. "A Knowledge Graph for GIS-Based Operational Resilience Assessment of Electricity Networks Against Climate Scenarios." In 2024 IEEE International Conference on Environment and Electrical Engineering and 2024 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe). IEEE, 2024. http://dx.doi.org/10.1109/eeeic/icpseurope61470.2024.10751512.
Full textJiang, Xinfan, Yonggang Liu, Jinbo Wu, Zhuping Liu, Yuanxi Chen, and Chuangxin Guo. "Graph Convolutional Network Based Power System Risk Assessment." In 2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2023. http://dx.doi.org/10.1109/ei259745.2023.10512548.
Full textYang, Xiaoming, Yifu Huang, Jiahao Wang, and Zhiguang Qin. "RFID system security assessment methodology based on attack graph model." In 2014 International Conference on Reliability, Maintainability and Safety (ICRMS). IEEE, 2014. http://dx.doi.org/10.1109/icrms.2014.7107386.
Full textSalamanis, Athanasios, Grigorios Christainas, Dionysios D. Kehagias, and Dimitrios Tzovaras. "A Graph-Based Reputation Assessment System for Online Review Communities." In 2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT). IEEE, 2020. http://dx.doi.org/10.1109/wiiat50758.2020.00054.
Full textReports on the topic "Graph-based assessment system"
Morin, Shai, Gregory Walker, Linda Walling, and Asaph Aharoni. Identifying Arabidopsis thaliana Defense Genes to Phloem-feeding Insects. United States Department of Agriculture, 2013. http://dx.doi.org/10.32747/2013.7699836.bard.
Full text