نتایج جستجو برای: vulnerability
تعداد نتایج: 42681 فیلتر نتایج به سال:
Context Using components with known vulnerabilities is still one of the most frequent causes for security incidents today [5]. It is of the essence, therefore, to possess a comprehensive overview of the software components utilized by the software, in order to mitigate the vulnerabilities they may withold prior to releasing the software. On the one hand, tools like Maven provide a reliable over...
with respect to population growth and agricultural development in ardabil plain, vulnerability assessment of the plain aquifer is necessary for management of groundwater resources and the prevention of groundwater contamination. in this study, vulnerability of ardabil plain aquifer to pollution was evaluated by drastic method. drastic model was prepared by seven effective parameters on vulnerab...
abstract background: leachate produced by waste disposal sites can be contaminating groundwater. the contamination vulnerability and groundwater protection assessment has proved to be an effective tool for the delineation of protection zones in area affected by groundwater contamination. the main objective of the study is to evaluate aquifer pollution vulnerability in the new waste disposal sit...
Objectives The triple vulnerability model includes three types of vulnerability in terms of emotional disorders: general biological vulnerability, general psychological vulnerability, and disorder-specific psychological vulnerability. Since previous studies have mostly addressed only one of these components, this study was conducted to examine all the three components of the triple vulnerabilit...
the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. when certain ver...
A small but growing literature has been concerned about the economic (and environmental) vulnerability on the level of countries. Less attention is paid to the economic vulnerability of different regions within countries. By focusing on the vulnerability of subnational regions, our paper contributes to the small literature on the ‘vulnerability of place’. We see the vulnerability of place as be...
Security researchers can send vulnerability notifications to take proactive measures in securing systems at scale. However, the factors affecting a notification’s efficacy have not been deeply explored. In this paper, we report on an extensive study of notifying thousands of parties of security issues present within their networks, with an aim of illuminating which fundamental aspects of notifi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید