Exploring vulnerabilities in preparedness – rail bound traffic and terrorist attacks

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classes of Vulnerabilities and Attacks

In the first part of this chapter, popular vulnerability and attack types used in books, vulnerability disclosures and databases are reviewed. They are discussed in the context of what makes them useful, and how they fail to meet scientific criteria, without going into the exploit details. Practical efforts such as the various MITRE enumerations and lists of common security problems by other or...

متن کامل

Geographic Profiling of Terrorist Attacks

Terrorism is defined by the Federal Bureau of Investigation (FBI) as “ the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives” (1). Since the terrorist attacks that occurred in the United States on September 11, 2001, attempts have been made to devel...

متن کامل

Psychological interventions following terrorist attacks.

BACKGROUND Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. SOURCES OF DATA A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. AREAS OF AGREEMENT Common aspec...

متن کامل

Scheduler Vulnerabilities and Attacks in Cloud Computing

In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance. As in an operating system, the scheduler may be vulnerable to malicious behavio...

متن کامل

Vulnerabilities and Attacks in Wireless Sensor Networks

We investigate how wireless sensor networks can be attacked in practice. From this we develop a generic adversary model that allows to classify adversaries according to two dimensions of power: presence and intervention. Thus, we provide a framework for realistic security analysis in wireless sensor networks.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Transportation Security

سال: 2017

ISSN: 1938-7741,1938-775X

DOI: 10.1007/s12198-017-0178-5