نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

Journal: :محیط زیست طبیعی 0
مریم سعید صبائی دانش آموخته کارشناسی ارشد محیط زیست، دانشکده منابع طبیعی، ایران افشین دانه کار استادیار دانشکده منابع طبیعی دانشگاه تهران، ایران علی اصغر درویش صفت استاد دانشکده منابع طبیعی دانشگاه تهران، ایران عبدالعظیم قانقرمه عضو هیأت علمی مرکز تحقیقات منابع طبیعی دریای خزر، ایران حسن آزرم دل دانش آموخته کارشناسی ارشد دانشکده مرتع و آبخیزداری دانشگاه علوم کشاورزی و منابع طبیعی گرگان، ایران

many studies since 1977, in the southern coast of caspian sea revealed that the law-setback and low-lying coastal zone have been severely and increasingly impacted by rising sea-level. this rising continued until 1995. the rate of rising was nearly 13cm per year in this period (1977-1995). the general concept of setback determination is tended to introduce a buffer area between human activities...

2009
Laurie A. Williams Michael Gegick Andrew Meneely

Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of...

2011

Introduction Recently, MITRE/SEDI developed a new draft component schema for OVAL to support interaction with the Trusted Platform Module (TPM). At a basic level, this is no different than most other component schemas: it simply expands OVAL's ability to collect system state information into a new component. However, because of some of the unique features of the TPM, this expansion of OVAL also...

2005
K. Hollenstein

Risk assessments for natural hazards are becoming more widely used and accepted. Using an extended definition of risk, it becomes obvious that performant procedures for vulnerability assessments are vital for the success of the risk concept. However, there are large gaps in knowledge about vulnerability. To alleviate the situation, a conceptual extension of the scope of existing and new models ...

2007
Jamshed Hasan

Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technolo...

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2007
Walter W Piegorsch Susan L Cutter Frank Hardisty

We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric signific...

2015
Harshdeep Singh Puri Asha Rao

The objective of this study was to provide vulnerability analysis for multi biometric systems and their performance against the known attacks. The report helps in identifying and analyzing risks that may have detrimental outcomes on the security provided by multi biometric systems. The risk assessment process was based on the standards of Risk Management (ISO 31000). Investigation of various re...

Journal: :Sultan Qaboos University Journal for Science [SQUJS] 2002

Journal: :Transportation Research Interdisciplinary Perspectives 2020

Journal: :Journal of korean society of hazard mitigation 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید