نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
The number of Web controls’ security vulnerability surged with ever-changing varieties of attacks. Therefore this paper analyzes test model for Web controls’ vulnerability, and put forward a improved test model for Web controls’ vulnerability. Be aimed to test vulnerability of Web ActiveX controls combining static analysis and dynamic analysis, as well as put forward a proposal of optimizing th...
Introduction: Mining is one of the most effective human activities to change the situation in the region, particularly in arid area. The human demand for minerals and energy resources under the ground has made mining and exploration operations inevitable. Mining is one of the common human behaviors with numerous outcomes for the ecosystem along with serious environmental and ecological conseque...
To determine the potential for groundwater contamination, vulnerability should be evaluated in different areas susceptible to contamination should be investigated. Aquifer (carbonate) karst or part of it is karst aquifer in the western region of Iran; due to the natural conditions of the region and human activities, they are susceptible to contamination by carbonate aquifer through holes devour...
Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile co...
Can repeated patterns of vulnerability and resilience be identified across urban areas? This question is addressed using a conceptualization of vulnerability developed by the climate community and applying a model-centered meta-analysis approach of 64 case studies on cities and vulnerability. In this meta-analysis the authors pull a minimum set of models or frameworks to go beyond existing case...
Objectives The triple vulnerability model includes three types of vulnerability in terms of emotional disorders: general biological vulnerability, general psychological vulnerability, and disorder-specific psychological vulnerability. Since previous studies have mostly addressed only one of these components, this study was conducted to examine all the three components of the triple vulnerabilit...
the agriculture sector has been affected by severe drought in recent years, making development of a drought warning system for agriculture crucial. such a system can be a useful tool for policy makers and investors. this research develops a model for agricultural drought risk assessment using statistical and intelligent methods. kermanshah province, a major rain-fed region of iran, was selected...
Repeatability is essential to any science—computer science is no exception. However, the area of vulnerability analysis suffers from ambiguous definitions that hinder the repeatability of analysis results. Many researchers have turned to policy-based definitions of a vulnerability in an attempt to alleviate this ambiguity. However, it is rare that security policies are explicitly and precisely ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید