نتایج جستجو برای: network vulnerability
تعداد نتایج: 710634 فیلتر نتایج به سال:
In communication networks, greater degrees of stability or less vulnerability is required. The vulnerability of communication network measures the resistance of the network to the disruption of operation after the failure of certain stations or communication links. If the network begins losing communication links or processors, then there is a loss in its effectiveness. Thus, communication netw...
Reliable electrical power supply is a prerequisite for the modernsociety, and if it fails, it can cause severe consequences in terms of economiclosses and even fatalities. It is thus important to analyse the vulnerabilityof the electric power system. Network analysis has previously been used toanalyse the vulnerability of electric transmission systems. Recent events inSweden...
Aims & Backgrounds: The occurrence of earthquakes in urban areas, have destructive effects, and the inhabitants are increasingly suffering from their harmful impacts. It appears that preparing proactive planning before the disaster occurrence, may reduce damages, casualties and financial losses. This paper aims to identify the vulnerability of the physical fabric of Hashtgerd new town against a...
Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks
A vulnerability analysis of possible use in security studies is presented. The analysis of the London underground network suggests that the stations bombed on 7 July, 2005 may not have been chosen randomly. From the viewpoint of effectively disturbing the transport system, nearly the best choice was made out of roughly 3 million possible combinations for attacking three stations. By comparing t...
This paper presents the Cellular Network Vulnerability Assessment Toolkit CAT, designed for end-to-end vulnerability assessment of 3G networks. It is the first tool of its kind to model and represent 3G network vulnerabilities and attacks as attack graphs. CAT uses freely available 3G telecommunication specifications written in SDL, the standard Specification and Description Language to produce...
In a communication network, several vulnerability measures are used to determine the resistance of the network to disruption of operation after the failure of certain stations or communication links. If the communication network is modeled as a simple, undirected, connected and unweighted graph G, then average lower independence number of a graph G can be considered as a measure of graph vulner...
IPv6 is a network layer protocol of the OSI reference model. IPv6 uses the Neighbor Discovery Protocol (NDP) that works on link local scope of IPv6 network. NDP covers host initialization and address auto configuration that is one of IPv6 advantages and other important functionalities. IPv6 mandates to support Internet Protocol Security (IPSec) for end‐to‐end communication security. However, th...
1-introduction one of the problems that is important in the waste management is the topic of waste rural landfill site selection and latex resulting from that in rural areas. the latex can be because groundwater pollution the contamination vulnerability and groundwater protection assessment has proved to be an effective tool for the delineation of protection zones in area affected by groundwate...
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensure that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estima...
With the proliferation of smart grids and the construction of various electric IT systems and networks, a next-generation substation automation system (SAS) based on IEC 61850 has been agreed upon as a core element of smart grids. However, research on security vulnerability analysis and quantification for automated substations is still in the preliminary phase. In particular, it is not suitable...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید