نتایج جستجو برای: vulnerability analysis
تعداد نتایج: 2857032 فیلتر نتایج به سال:
Climate change is predicted to increase the intensity and negative impacts of urban heat events, prompting the need to develop preparedness and adaptation strategies that reduce societal vulnerability to extreme heat. Analysis of societal vulnerability to extreme heat events requires an interdisciplinary approach that includes information about weather and climate, the natural and built environ...
Vulnerability refers to the degree of an individual subject to the damage arising from a catastrophic disaster. It is affected by multiple indicators that include hazard intensity, environment, and individual characteristics. The traditional area aggregate approach does not differentiate the individuals exposed to the disaster. In this article, we propose a new solution of modeling vulnerabilit...
This paper presents a spatial analysis of likely/potential hotspots of sustainability issues in Mainland China through an empirical investigation of patterns of ecological vulnerability in and of China’s megaregions. To be specific, this paper assesses the level of patterns of the ecological vulnerability of 16 megaregions through an indicator system, which includes soil erosion, desertificatio...
This work presents a proposal of a source code analysis aid tool focused on security. Its main goal is to help developers to find vulnerabilities in their own software. The proposed tool analyzes a software source code to find buffer overflow vulnerabilities through a preventive and software-dependent approach, in a syntactic level. To achieve it, the environment tries to supply the limitations...
Event based systems are flexible, scalable, and adaptable based on its feature of non-determinism in event communication. However, this may yield security vulnerabilities in event communication between components. For example, malicious components can steal sensitive data or manipulate other components in an intended way. This paper introduces SCUTUM, a novel technique that automatically detect...
This study aims to develop a new procedure that combines multi-criteria spatial vulnerability analysis with the traditional linear probabilistic risk approach. This approach is named integrated fuzzy flood vulnerability assessment because it combines the watershed-based vulnerability framework with stream-based risk analysis. The Delphi technique and pressure-state-impact-response framework are...
During the Covid-19 epidemic, the mental health of nurses and staff in patient-related wards is critical. The aim of this study was to investigate the mediating role of cognitive emotion regulation in the relationship between perceived vulnerability to disease and the experience of post-traumatic stress symptoms in the caregiving staff of patients with Covid-19. The present study is basic resea...
• Vulnerability identification—Identify system’s weaknesses. • Control analysis—Analyze controls in place to prevent vulnerabilities from being exploited. • Likelihood determination—Determine probability of a vulnerability being exploited. • Impact analysis—Analyze impact on organization should a vulnerability be exploited. • Risk determination—Develop prioritized listing of risks (ie, gaps in ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید