نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
The growing interest in adaptation policies in the context of climate change, especially among developing countries, is making vulnerability assessment a very active area of research. Understanding present day vulnerabilities and adaptation potential among local communities is increasingly being considered as a pre-requisite to such assessments. This paper focuses on understanding and quantifyi...
A method of developing a vulnerability map of a commercial aircraft is presented using MSC/DYTRAN and MSC/NASTRAN. The intent of the map is to establish the vulnerability of every point in the cargo hold where a bomb can explode. One might interpret each point in the cargo bay as having four dimensions. Three are spatial coordinates and the fourth is the maximum size of the bomb the structure c...
Objective: Addiction is one of the most vulnerable social issues and the tendency to it involve several factors, including psychosocial stressors (life unpleasant events), and inability to deal with these stressors and the belief that drug use will lead to the desired result. This study was conducted to determine the relationship between psychosocial stressors and vulnerability to drug abuse am...
The System Vulnerability Stack is a novel method to compute a system’s vulnerability to transient faults (see Figure 1). The vulnerability stack observes that a system consists of multiple independent layers that interact through well-defined interfaces (e.g., the ISA). Therefore, the vulnerability stack quantifies fault masking within an individual layer by focusing on its interfaces: a fault ...
We estimated vulnerability and pollution risk of groundwater at the pan-African scale. We therefore compiled the most recent continental scale information on soil, land use, geology, hydrogeology and climate in a Geographical Information System (GIS) at a resolution of 15 km × 15 km and at the scale of 1:60,000,000. The groundwater vulnerability map was constructed by means of the DRASTIC metho...
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important. Unfortunately, despite all progress in security and privacy mechanisms, vulnerabilities continue to proliferate. Research has shown that many vulnerabilities are due to insecure programming practices. However, each study has often dealt with a specific issue, maki...
This paper presents a technique for vulnerability detection in C programs. It is based on a vulnerability formal model called “Vulnerability Detection Conditions" (VDCs). This model is used together with passive testing techniques for the automatic detection of vulnerabilities. The proposed technique has been implemented in a dynamic code analysis tool, TestInv-Code, which detects the presence ...
To understand the effect of code complexity on static analysis, thirty-five format string vulnerabilities were studied. We analyzed two code samples for each vulnerability, one containing the vulnerability and one in which the vulnerability was fixed. We examined the effect of code complexity on the quality of static analysis results, including successful detection and false positive rates. Sta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید