نتایج جستجو برای: vulnerability risk
تعداد نتایج: 976669 فیلتر نتایج به سال:
This paper develops a novel approach to the analysis of vulnerability in the context of food security. The proposed methodology incorporates recent developments in the analysis of risk management. It can be applied to estimate the probability that a household or a community might fall below a critical food security threshold at some time in the future. The methodology also aims to identify the ...
vulnerability and contamination risk assessment is of great importance in karst aquifer management. because of vastness of karst in zagros, natural conditions and human activity within the region of aquifer, pollution emission has become one of the most important challenges in front of zagros aquifers. the purpose of this study is to assess marab aquifer vulnerability, using riske model and, de...
چکیده ندارد.
Urban planning rules and considering land use regarding faults can change the consequences of natural hazard such as earthquake. Vulnerability risk is increasing in Region 1 because of existence of the north fault, steep slopes and continuous construction of high-rise buildings. It is clear that Region 1’s Master Plan shouldn’t be prepared without considering natural hazard such as ...
bandar abbas (center of hormozgan province) is the most important port city in the south of iran because of its historical places, cultural, economic, social and political importance. high risk of earthquake occurrence in this city and its province indicates the necessity of surveying the seismic vulnerability of buildings. the object of this paper is collected from existing buildings, compiled...
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensure that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estima...
background: substance abuse prevalence and the number of suicides among university students is less than public population; however the sensitivity of society regarding the occurrence of such damages among students puts special emphasis on appraising these variables. more than 30% of iranian students study in islamic azad university. objectives: the current research aimed to appraise the vulner...
the efficiency of three statistical models, ahp surface-weighted density bivariate (semi-quantitative models), stepwise multivariate regression and logistic multivariate regression models were compared in chehel-chai watershed in golestan province, iran. in current study the hazard map was prepared according to the top model of landslide hazard map. chehel-chai watershed is located as one of go...
Vulnerability risk assessment is a crucial process in security management, and the CVSS score is the standard-de-facto risk metric for software vulnerabilities. In this manuscript I show that current risk assessment methodologies do not fit real “in the wild” attack data. I also present my three-steps plan to identify an Internet-scale risk assessment methodology that accounts for attacker econ...
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. Th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید