نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Journal: :journal of structural engineering and geo-techniques 2015
araliya mosleh jose jara humberto varum

past earthquakes have demonstrated that old rc bridges may be seismically vulnerable. bridge responses during the last decades illustrated the necessity of the seismic assessment of bridges especially those which were designed with old codes. in this research an existing concrete bridge representative of the most common bridges in the highway system in iran are studied. push over and nonlinear ...

Journal: :معماری و شهرسازی 0
محمدمهدی عزیزی استاد دانشکده شهرسازی، پردیس هنرهای زیبا، دانشگاه تهران میلاد همافر کارشناس ارشد برنامه ریزی شهری و منطقه ای، پردیس بین المللی کیش، دانشگاه تهران

while risk reduction has been mainly addressed by seismologists and engineers by now, the total impact of earthquake greatly depends on urban planning factors. the effects of planning can be considered in the socio economic and physical aspects. urban planning may have a dominant role in various earthquake phases: at the time of earthquake; rescue, and emergency, as well as temporary and perman...

Journal: :آمایش سرزمین 0
سعید امان پور دانشیار، دانشکدة علوم زمین، دانشگاه شهید چمران اهواز، اهواز، ایران مصطفی محمدی ده چشمه استادیار، دانشکدة علوم زمین، دانشگاه شهید چمران اهواز، اهواز، ایران مهدی علیزاده دانشجوی کارشناسی ارشد، دانشکدة علوم زمین، دانشگاه شهید چمران اهواز، اهواز، ایران

the occurrence of natural and human disasters can create heavy casualties in cities and urban areas and such a critical issue makes it inevitable to pay a great deal of attention to the vulnerability and safety aspects of cities and the accessibility to the urban welfare standards from the perspective of passive defense. the geostrategic location of koohdasht city in iran and its vulnerability ...

2010
Sushil Jajodia Steven Noel

Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vu...

2017
Saqib Hasan Ajay Chhokra Nagabhushan Mahadevan Abhishek Dubey

Electrical power systems consists of various components including physical components such as generator, transmission lines, buses, loads, transformers etc. and discrete components such as protection relays and other supervisory and control devices. Cyber failures in discrete components such as protection devices contribute towards cascading failures resulting in blackouts in electrical power t...

Disaster Management and current approaches in this field in one hand only has focused to physicalvulnerabilities and in the other hand has included consequential action to reduce vulnerability and improve physicalpreparation as well as resistance institutional insignificant during the disaster. Therefore, these approaches usually haveignored the capabilities and capacities of residents to reduc...

2005
Sean Whalen Matt Bishop Sophie Engle

Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...

2007
HUA CHEN TAO ZOU DONGXIA WANG

The security of information systems has been the focus because of network applications. Vulnerability analysis is widely used to evaluate the security of a system to assure system security. With the help of vulnerability analysis, the security risk of a system can be predicted so that the countermeasures are arranged in advance. These will promote system security effectively. The object of vuln...

2004
Sean Whalen Matt Bishop Sophie Engle

Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید