نتایج جستجو برای: vulnerability assessment
تعداد نتایج: 598326 فیلتر نتایج به سال:
many studies since 1977, in the southern coast of caspian sea revealed that the law-setback and low-lying coastal zone have been severely and increasingly impacted by rising sea-level. this rising continued until 1995. the rate of rising was nearly 13cm per year in this period (1977-1995). the general concept of setback determination is tended to introduce a buffer area between human activities...
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in software as it is developed. Because the focus on software security has increased only recently, software development teams often do not have expertise in techniques for identifying security risk, understanding the impact of...
Introduction Recently, MITRE/SEDI developed a new draft component schema for OVAL to support interaction with the Trusted Platform Module (TPM). At a basic level, this is no different than most other component schemas: it simply expands OVAL's ability to collect system state information into a new component. However, because of some of the unique features of the TPM, this expansion of OVAL also...
Risk assessments for natural hazards are becoming more widely used and accepted. Using an extended definition of risk, it becomes obvious that performant procedures for vulnerability assessments are vital for the success of the risk concept. However, there are large gaps in knowledge about vulnerability. To alleviate the situation, a conceptual extension of the scope of existing and new models ...
Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technolo...
We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric signific...
The objective of this study was to provide vulnerability analysis for multi biometric systems and their performance against the known attacks. The report helps in identifying and analyzing risks that may have detrimental outcomes on the security provided by multi biometric systems. The risk assessment process was based on the standards of Risk Management (ISO 31000). Investigation of various re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید