نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
Fork-based symbolic execution would waste large amounts of computing time and resource on invulnerable paths when applied to vulnerability detection. In this paper, we propose a statically-guided fork-based symbolic execution technique for vulnerability detection to mitigate this problem. In static analysis, we collect all valid jumps along vulnerable paths, and define the priority for each pro...
Urban planning rules and considering land use regarding faults can change the consequences of natural hazard such as earthquake. Vulnerability risk is increasing in Region 1 because of existence of the north fault, steep slopes and continuous construction of high-rise buildings. It is clear that Region 1’s Master Plan shouldn’t be prepared without considering natural hazard such as ...
example, should they first address a vulnerability with a severity of “5” or one with a severity of “high”? The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities. Organizations currently generating CVSS scores include Cisco, US National Institute of Stand...
Vulnerability discovery technology becomes more and more important in software development and network security. This paper presents the classification of vulnerability discovery technologies and discusses the advantages, disadvantages and the extent of application of each class. Then we emphasize the procedure and the improvement methods of the Fuzzing test combined with protocol analysis. Fur...
background and objectives: health human resources is the major asset of the health system. the status of human resources in upstream and regulatory health organizations can exert high impact on the effectiveness of health policies and the performance of health system. this study, hence, was designed to explore the possible area of human resource damage to the employees of the iranian ministry o...
Background: Lack of life skills can lead the person toward incompetency in educational attainment, psychological trauma and in extreme cases contribute to promoting drug abuse and other high risk behaviors. The present study aims to investigate the relationship between life skills and vulnerability to drug abuse among university students. Materials and Methods: In this descriptive correl...
In the past years, the expressive increase in the development of computer technologies has been followed by an increasing number of systems being probed, infected, compromised and used to launch attacks on other systems. Successful attacks against computer systems are due to the exploitation of some kind of vulnerability. Poor programming techniques are the main cause of vulnerabilities. The mo...
This paper attempts to compare the concepts and metrics related to vulnerability notion as used in the poverty literature with those in the filed of climate change. Such comparison could shed light on the understanding of the perceived and real differences between the two fields and also help to identify possible policy synergies between the climate change and poverty communities. The analysis ...
This paper introduces an analytical framework for evaluating the vulnerability of people and places to environmental and social forces. The framework represents the relative vulnerability of a variable of concern (e.g. such as agricultural yield) to a set of disturbing forces (e.g. climate change, market fluctuations) by a position on a three-dimensional analytical surface, where vulnerability ...
در تقویت سازه های بتن آرمه پس از مطالعه و بررسی اسیب پذیری سازه در سطوح موضعی و کلی و شناخت ضعفهای عمده سازه راه کارهای تقویتی مختلفی پیش روی سازه قرار می گیرد. هر یک از این راه کارها پس از بررسی و مدل سازی و حصول نتیجه باید بصورت دیتایلهای اجرایی مشخص گردد. تا یکی از این راه کارها پس از مطالعه و ارزیابی به عنوان گزینه مناسب تقویت بکار روند.معیارهای ارزیابی و انتخاب روش تقویت را می توان براساس...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید