نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. essential in analysis networks, but costly compute. Currently, fastest known algorithms run polynomial time. Motivated by fast-growing need compute measures on new for computing node and edge residual are introduced this paper. Those reduce running times Θ(n 3 ) Θ (n 4 ...
Urban ecological vulnerability is measured on the basis of ecological sensitivity and resilience based on the concept analysis of vulnerability. GIS-based multicriteria decision analysis (GIS-MCDA) methods are used, supported by the spatial analysis tools of GIS, to define different levels of vulnerability for areas of the urban ecology. These areas are further classified into different types o...
With increasing faults and attacks on the Internet infrastructure, there is an urgent need to develop techniques to analyze network and service vulnerability under organized fault attacks. Network vulnerability refers to the impact of attacks and faults on network and system behaviors. An accurate vulnerability analysis requires a deep understanding of failure modes and effects on each of the n...
Slums are examples of localized communities within third world urban systems representing a range of vulnerabilities and adaptive capacities. This study examines vulnerability in relation to flooding, environmental degradation, social-status, demographics, and health in the slums of Accra, Ghana by utilizing a place-based approach informed by fieldwork, remote sensing, census data, and geograph...
To understand the effect of code complexity on static analysis, thirty-five format string vulnerabilities were selected from the National Vulnerability Database. We analyzed two sets of code for each vulnerability. The first set of code contained the vulnerability, while the second was a later version of the code in which the vulnerability had been fixed. We examined the effect of both code com...
This paper aims to develop a set of valid and reliable indicators to evaluate the regional land subsidence disaster vulnerability. The proposed indicator system can provide effective theoretical support for further land subsidence risk evaluation and risk management. This study transfers the qualitative analysis of land subsidence vulnerability to quantitative evaluation by developing a univers...
Apply systems engineering approaches to measure and analysis vulnerabilities of military tactical RF wireless networks. Develop smart and innovative performance matrixes through EW modeling and simulation scenarios. Systematic utilize of systems engineering approaches with RF electronic warfare modeling and simulation scenarios to support research in vulnerability analysis. RF electronic warfar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید