نتایج جستجو برای: vulnerability risk

تعداد نتایج: 976669  

2013
Anita Finnegan Fergal McCaffery Gerry Coleman

This paper presents work for the development of a framework to assure the security of networked medical devices being incorporated. The paper focuses on one component of the framework, which addresses system development processes, and the assurance of these through the use of a Process Assessment Model with a major focus on the security risk management process. With the inclusion of a set of sp...

2005

This case study is about preparing the urban communities for earthquake hazard through organizing the communities and activating the service providers (organizations responsible for responding to earthquake hazard). Being a pilot initiative, the project was intervened in 16 communities / wards of Dhaka City that were selected based on their receptivity and vulnerability through community partic...

ژورنال: علوم آب و خاک 2014
سفیانیان, علیرضا , سلطانی, سعید , قاسمی نژاد, سعیده ,

Drought is a one of the most important natural disasters that have high socio-economic and environmental impacts. However, drought is more than a physical phenomenon or natural event. Its impact results from the relation between a natural event and demands on the water supply, and it is often exacerbated by human activities. The traditional approach to drought management has been reactive, re...

Babak Omidvar, Ramin Azizi Yasser abdollahi

Power networks are among the most important infrastructures that without them, industrial, economic and social procedures will halt. Therefore, they should be planned for the most difficult conditions to provide services with minimum disruption. Power substations are of great importance to a power network, because any disruption in their components can produce extensive problems through the net...

2008
Lutz Lowis

IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [GLLR06] demonstrates. According to the survey, many companies consider it important to quantify the losses attacks against their IT systems cause but are unable to do so. In service-oriented architectures, we see a promi...

2010
Paul Rohmeyer Tal Ben-Zvi

This paper explores the use of risk management techniques to promote the design of resilient services. Success in achieving any benefit from a new service will be directly affected by the resiliency of the supporting service architecture including technical and non-technical domains. The concept of resiliency in services and enterprises is examined. We present a framework to analyze risks and t...

2010
B. Rey

We introduce the notion of cross-risk vulnerability to generalize the concept of risk vulnerability introduced by Gollier and Pratt (1996). While risk vulnerability captures the idea that the presence of an unfair financial background risk should make risk-averse individuals behave in a more risk-averse way with respect to an independent financial risk, cross-risk vulnerability extends this ide...

Journal: :Economic Theory 2016

Journal: :SSRN Electronic Journal 2005

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده مهندسی 1387

چکیده ندارد.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید