نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

2010
Olga V Wilhelmi Mary H Hayden

Climate change is predicted to increase the intensity and negative impacts of urban heat events, prompting the need to develop preparedness and adaptation strategies that reduce societal vulnerability to extreme heat. Analysis of societal vulnerability to extreme heat events requires an interdisciplinary approach that includes information about weather and climate, the natural and built environ...

Journal: :International Journal of Geographical Information Science 2010
Lianfa Li Jinfeng Wang Hareton K. N. Leung

Vulnerability refers to the degree of an individual subject to the damage arising from a catastrophic disaster. It is affected by multiple indicators that include hazard intensity, environment, and individual characteristics. The traditional area aggregate approach does not differentiate the individuals exposed to the disaster. In this article, we propose a new solution of modeling vulnerabilit...

2017
Hui Zou Xuejun Duan Lei Ye Lei Wang

This paper presents a spatial analysis of likely/potential hotspots of sustainability issues in Mainland China through an empirical investigation of patterns of ecological vulnerability in and of China’s megaregions. To be specific, this paper assesses the level of patterns of the ecological vulnerability of 16 megaregions through an indicator system, which includes soil erosion, desertificatio...

2006
L. O. Duarte A. Montes

This work presents a proposal of a source code analysis aid tool focused on security. Its main goal is to help developers to find vulnerabilities in their own software. The proposed tool analyzes a software source code to find buffer overflow vulnerabilities through a preventive and software-dependent approach, in a syntactic level. To achieve it, the environment tries to supply the limitations...

2017
Youn Kyu Lee Daye Nam Nenad Medvidovic

Event based systems are flexible, scalable, and adaptable based on its feature of non-determinism in event communication. However, this may yield security vulnerabilities in event communication between components. For example, malicious components can steal sensitive data or manipulate other components in an intended way. This paper introduces SCUTUM, a novel technique that automatically detect...

2013
G. Lee

This study aims to develop a new procedure that combines multi-criteria spatial vulnerability analysis with the traditional linear probabilistic risk approach. This approach is named integrated fuzzy flood vulnerability assessment because it combines the watershed-based vulnerability framework with stream-based risk analysis. The Delphi technique and pressure-state-impact-response framework are...

ژورنال: رویش روانشناسی 2022

During the Covid-19 epidemic, the mental health of nurses and staff in patient-related wards is critical. The aim of this study was to investigate the mediating role of cognitive emotion regulation in the relationship between perceived vulnerability to disease and the experience of post-traumatic stress symptoms in the caregiving staff of patients with Covid-19. The present study is basic resea...

Journal: :WMJ : official publication of the State Medical Society of Wisconsin 2015
Jay A Gold Brad Trudell

• Vulnerability identification—Identify system’s weaknesses. • Control analysis—Analyze controls in place to prevent vulnerabilities from being exploited. • Likelihood determination—Determine probability of a vulnerability being exploited. • Impact analysis—Analyze impact on organization should a vulnerability be exploited. • Risk determination—Develop prioritized listing of risks (ie, gaps in ...

Journal: :International Journal of Intelligent Computing Research 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید