نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
past earthquakes have demonstrated that old rc bridges may be seismically vulnerable. bridge responses during the last decades illustrated the necessity of the seismic assessment of bridges especially those which were designed with old codes. in this research an existing concrete bridge representative of the most common bridges in the highway system in iran are studied. push over and nonlinear ...
while risk reduction has been mainly addressed by seismologists and engineers by now, the total impact of earthquake greatly depends on urban planning factors. the effects of planning can be considered in the socio economic and physical aspects. urban planning may have a dominant role in various earthquake phases: at the time of earthquake; rescue, and emergency, as well as temporary and perman...
the occurrence of natural and human disasters can create heavy casualties in cities and urban areas and such a critical issue makes it inevitable to pay a great deal of attention to the vulnerability and safety aspects of cities and the accessibility to the urban welfare standards from the perspective of passive defense. the geostrategic location of koohdasht city in iran and its vulnerability ...
Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vu...
Electrical power systems consists of various components including physical components such as generator, transmission lines, buses, loads, transformers etc. and discrete components such as protection relays and other supervisory and control devices. Cyber failures in discrete components such as protection devices contribute towards cascading failures resulting in blackouts in electrical power t...
Disaster Management and current approaches in this field in one hand only has focused to physicalvulnerabilities and in the other hand has included consequential action to reduce vulnerability and improve physicalpreparation as well as resistance institutional insignificant during the disaster. Therefore, these approaches usually haveignored the capabilities and capacities of residents to reduc...
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...
The security of information systems has been the focus because of network applications. Vulnerability analysis is widely used to evaluate the security of a system to assure system security. With the help of vulnerability analysis, the security risk of a system can be predicted so that the countermeasures are arranged in advance. These will promote system security effectively. The object of vuln...
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید