نتایج جستجو برای: vulnerability
تعداد نتایج: 42681 فیلتر نتایج به سال:
For cloud providers it is important to offer services that safeguard their users from existing vulnerabilities. Research has shown that is not uncommon for libraries to contain vulnerabilities that can have serious security implications. Traditional host based vulnerability scanners can be used to identify such vulnerable libraries. However, these scanners require the user to install and mainta...
This paper reviews research traditions of vulnerability to environmental change and the challenges for present vulnerability research in integrating with the domains of resilience and adaptation. Vulnerability is the state of susceptibility to harm from exposure to stresses associated with environmental and social change and from the absence of capacity to adapt. Antecedent traditions include t...
By conceptualising local seismic construction practices as capital, this paper proposes a theoretical framework within which its conservation can be envisioned as a means to reducing vulnerability and moving towards more sustainable development. The application of the proposed conceptual framework is demonstrated in the case of Lefkada Island in Greece. Each of the four key constructs (local se...
The growth of technology is heading security systems in a challenging way with amalgamation of different threats and vulnerabilities. Although it is becoming easier day by day to find out the abnormality in the ongoing video with advancement of technology in the field of video cameras, however it is still challenging to detect the undesired event at the time of happening considering the crowd m...
Adverse events such as disasters are interpreted through a system of meaning provided by culture. Historically, research into society’s response to disasters provides numerous examples of community resilience in face of adversity. However, since the 1980s, numerous researchers have challenged the previous optimistic accounts and argue that such incidents result in long-term damage to the commun...
This study considers the influence of perceived likelihood, demographics (gender and education) and personality on fear of victimization and cyber-victimization using a survey design (N=159). The results suggest that perceived likelihood of victimization predicts fear of victimization in traditional contexts. Women tend to be more fearful of victimization in traditional and cyber contexts, conf...
With the increasing concern for security in the network, many approaches are laid out that try to protect the network from unauthorised access. New methods have been adopted in order to find the potential discrepancies that may damage the network. Most commonly used approach is the vulnerability assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the a...
Introduction In this essay we explore some distinctions between vulnerability-based and risk-based approaches to management of extreme events. We use the word "vulnerability" to describe inherent characteristics of a system that create the potential for harm but are independent of the probabilistic “risk” of the occurrence of any particular hazard or extreme event. We distinguish between the “r...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
According to the issues raised, the present study has been compiled with the aim of examining and assessing the situation of cities from the perspective of urban crisis management components. The research method in this research is a combination of research, applied (using the results and output of research in Shirvan) and development; Statistical population In the present study, according to t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید