نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
objective: this study aimed to investigate the mediating role of maladaptive schemas between childhood emotional maltreatment and psychological distress among college students. methods: this was a descriptive-correlative and after the fact study. a total of 315 students were selected with multistage cluster sampling from students of tehran universities. the participants completed the lifetime o...
To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among multiple network elements. For a vulnerability analysis tool to be useful in practice, two features are crucial. First, the model used in the analysis must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second, the...
This paper attempts to contribute to international discourse on the responsibility of macro structures (economic and political) and private agencies for the production and distribution of vulnerability. It does so by focusing on an individual economic entity, small manufacturing firms (SMFs), in a specific location, western Athens, Greece. By evaluating the losses that SMFs sustained in the ear...
The use of container technology has skyrocketed during the last few years, with Docker as leading platform. Docker’s online repository for publicly available images, called Hub, hosts over 3.5 million images at time writing, making it world’s largest community images. We perform an extensive vulnerability analysis 2500 It is particular interest to this type because landscape a rapidly changing ...
Vulnerability is a central concept in humanitarian aid. Discussions of vulnerability in disaster response literature and guidelines for humanitarian aid range from considerations of a universal human vulnerability, to more nuanced examinations of how particular characteristics render individuals more or less at risk. Despite its frequent use, there is a lack of clarity about how vulnerability i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید