نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

2007
Sumana Bhattacharya

The growing interest in adaptation policies in the context of climate change, especially among developing countries, is making vulnerability assessment a very active area of research. Understanding present day vulnerabilities and adaptation potential among local communities is increasingly being considered as a pre-requisite to such assessments. This paper focuses on understanding and quantifyi...

1996
Y. I. Moon

A method of developing a vulnerability map of a commercial aircraft is presented using MSC/DYTRAN and MSC/NASTRAN. The intent of the map is to establish the vulnerability of every point in the cargo hold where a bomb can explode. One might interpret each point in the cargo bay as having four dimensions. Three are spatial coordinates and the fourth is the maximum size of the bomb the structure c...

Farhad Ghadiri sourman abadi, Hasan Sabouri Moghadam, Jalil Babapur Kheiradin,

Objective: Addiction is one of the most vulnerable social issues and the tendency to it involve several factors, including psychosocial stressors (life unpleasant events), and inability to deal with these stressors and the belief that drug use will lead to the desired result. This study was conducted to determine the relationship between psychosocial stressors and vulnerability to drug abuse am...

2009
Vilas Sridharan David R. Kaeli

The System Vulnerability Stack is a novel method to compute a system’s vulnerability to transient faults (see Figure 1). The vulnerability stack observes that a system consists of multiple independent layers that interact through well-defined interfaces (e.g., the ISA). Therefore, the vulnerability stack quantifies fault masking within an individual layer by focusing on its interfaces: a fault ...

Journal: :The Science of the total environment 2016
Issoufou Ouedraogo Pierre Defourny Marnik Vanclooster

We estimated vulnerability and pollution risk of groundwater at the pan-African scale. We therefore compiled the most recent continental scale information on soil, land use, geology, hydrogeology and climate in a Geographical Information System (GIS) at a resolution of 15 km × 15 km and at the scale of 1:60,000,000. The groundwater vulnerability map was constructed by means of the DRASTIC metho...

2017
Pascal Gadient Mohammad Ghafari

The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important. Unfortunately, despite all progress in security and privacy mechanisms, vulnerabilities continue to proliferate. Research has shown that many vulnerabilities are due to insecure programming practices. However, each study has often dealt with a specific issue, maki...

2011
Amel Mammar Ana R. Cavalli Willy Jimenez Wissam Mallouli Edgardo Montes de Oca

This paper presents a technique for vulnerability detection in C programs. It is based on a vulnerability formal model called “Vulnerability Detection Conditions" (VDCs). This model is used together with passive testing techniques for the automatic detection of vulnerabilities. The proposed technique has been implemented in a dynamic code analysis tool, TestInv-Code, which detects the presence ...

2009
James Walden Adam Messer Alex Kuhl

To understand the effect of code complexity on static analysis, thirty-five format string vulnerabilities were studied. We analyzed two code samples for each vulnerability, one containing the vulnerability and one in which the vulnerability was fixed. We examined the effect of code complexity on the quality of static analysis results, including successful detection and false positive rates. Sta...

Journal: :Proceedings of the National Academy of Sciences 2003

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید