نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Journal: :Prikladnaya diskretnaya matematika 2009

Journal: :Acta Universitatis Sapientiae: Informatica 2022

Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. essential in analysis networks, but costly compute. Currently, fastest known algorithms run polynomial time. Motivated by fast-growing need compute measures on new for computing node and edge residual are introduced this paper. Those reduce running times Θ(n 3 ) Θ (n 4 ...

Journal: :European Journal for Security Research 2016

2015
Xiaorui Zhang Zhenbo Wang Jing Lin Vincenzo Torretta

Urban ecological vulnerability is measured on the basis of ecological sensitivity and resilience based on the concept analysis of vulnerability. GIS-based multicriteria decision analysis (GIS-MCDA) methods are used, supported by the spatial analysis tools of GIS, to define different levels of vulnerability for areas of the urban ecology. These areas are further classified into different types o...

2002
Guangzhi Qu Jayprakash Rudraraju R. Modukuri Salim Hariri Cauligi S. Raghavendra

With increasing faults and attacks on the Internet infrastructure, there is an urgent need to develop techniques to analyze network and service vulnerability under organized fault attacks. Network vulnerability refers to the impact of attacks and faults on network and system behaviors. An accurate vulnerability analysis requires a deep understanding of failure modes and effects on each of the n...

Journal: :Annals of GIS 2011
Marta M. Jankowska John R. Weeks Ryan Engstrom

Slums are examples of localized communities within third world urban systems representing a range of vulnerabilities and adaptive capacities. This study examines vulnerability in relation to flooding, environmental degradation, social-status, demographics, and health in the slums of Accra, Ghana by utilizing a place-based approach informed by fieldwork, remote sensing, census data, and geograph...

2008
James Walden Adam Messer Alex Kuhl

To understand the effect of code complexity on static analysis, thirty-five format string vulnerabilities were selected from the National Vulnerability Database. We analyzed two sets of code for each vulnerability. The first set of code contained the vulnerability, while the second was a later version of the code in which the vulnerability had been fixed. We examined the effect of both code com...

2016
Yu Chen

This paper aims to develop a set of valid and reliable indicators to evaluate the regional land subsidence disaster vulnerability. The proposed indicator system can provide effective theoretical support for further land subsidence risk evaluation and risk management. This study transfers the qualitative analysis of land subsidence vulnerability to quantitative evaluation by developing a univers...

2012
Philip Chan

Apply systems engineering approaches to measure and analysis vulnerabilities of military tactical RF wireless networks. Develop smart and innovative performance matrixes through EW modeling and simulation scenarios. Systematic utilize of systems engineering approaches with RF electronic warfare modeling and simulation scenarios to support research in vulnerability analysis. RF electronic warfar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید