نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
This work is aimed at supporting system and information owners in their mission to apply a proper remedy when a security flaw is discovered during system operation. A broad analysis of the different aspects of flaw remediation has resulted in a structured taxonomy that will guide the system and information owners through the remedy identification process. The information produced in the process...
In this paper we analyze the security of the new Brazilian Payment System. No worrying vulnerabilities were found, but there are some issues that we believe need to be addressed more carefully. Some minor changes and directions for further development of the system are proposed, such as: specifying which random number generators can be used in the system and encrypting digital signatures to avo...
Elie Burzstein discussed the Windows Data Protection API (DPAPI), a “black box” for encrypting and decrypting data that is used in many different parts of the Windows operating system, including the Encrypted File Systems (EFS), as well as a variety of other programs (Skype, Explorer, WiFi, etc.). Burzstein provided key insights into mounting the Windows EFS on Linux. This work also shows how o...
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. Most vulnerabilities arise from unexpected interactions between di erent system components such as server processes, lesystem permissions and content, and other operating system services. Existing vulnerability techniques (such as those used in C...
introduction one of the most vulnerable water resources against contamination is ground water table. these resources are exposed to contamination in various forms. identifying and controlling contamination in these resources are more difficult and costly than surface waters. also because of the persistence of contamination in these resources, the best way to prevent their contamination is to id...
The majority of vulnerability and adaptation scholarship, policies and programs focus exclusively on climate change or global environmental change. Yet, individuals, communities and sectors experience a broad array of multi-scalar and multi-temporal, social, political, economic and environmental changes to which they are vulnerable and must adapt. While extensive theoretical— and increasingly e...
urban effete textures are multiple problems at conspectus skeletal, environmental, social and economic that encounter life of inhabitants with problem in this texture. according to the research, almost 90% of population in country exposed hazard of occurrence earthquake. in this face, by reason of problems, effete textures are over damage if the earthquake happened. nonetheless, to make provisi...
In this study, an existing hospital structure has been evaluated with incremental dynamic analysis (IDA). This building is accommodated in Karaj with soil type II. At first, two 2-D frames along X, Y direction are selected. Then, five performance levels are determined according to “Rehabilitation Code for Existing Buildings (Publication No. 360) including Immediate Operational (IO), Limited Dam...
BACKGROUND The evidence that heat waves can result in both increased deaths and illness is substantial, and concern over this issue is rising because of climate change. Adverse health impacts from heat waves can be avoided, and epidemiologic studies have identified specific population and community characteristics that mark vulnerability to heat waves. OBJECTIVES We situated vulnerability to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید