نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

Journal: :Wiley Interdisciplinary Reviews: Climate Change 2018

Journal: :INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH 2020

Journal: :TRANSACTIONS of the VŠB – Technical University of Ostrava, Safety Engineering Series 2018

2008
K. Berkhoff

Introduction Conclusions References Tables Figures ◭ ◮ ◭ ◮ Back Close Full Screen / Esc Papers published in Hydrology and Earth System Sciences Discussions are under open-access review for the journal Hydrology and Earth System Sciences Abstract Introduction Conclusions References Tables Figures ◭ ◮ ◭ ◮ Back Close Full Screen / Esc Printer-friendly Version Interactive Discussion EGU Abstract An...

2005
Blake Shepard Cynthia Matuszek C. Bruce Fraser William Wechtenhiser David Crabbe Zelal Güngördü John Jantos Todd Hughes Larry Lefkowitz Michael J. Witbrock Douglas B. Lenat Erik Larson

CycSecure is a network risk assessment and network monitoring application that relies on knowledge-based artificial intelligence technologies to improve on traditional network vulnerability assessment. CycSecure integrates public reports of software faults from online databases, data gathered automatically from computers on a network and hand-ontologized information about computers and computer...

Journal: :The Journal of nervous and mental disease 2005
Eytan Bachar Hilit Hadar Arieh Y Shalev

This study empirically examined the role of narcissistic traits and narcissistic vulnerability in the development of post-traumatic stress disorder (PTSD). One hundred forty-four survivors of a traumatic event were assessed 1 week, 1 month, and 4 months following the event. In the first-week assessment, patients were administered the Narcissistic Vulnerability Scale and self-reported rating sca...

2017

Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited. However manual analysis of network testing and vulnerability assessment results is time consuming and demands expertise. This paper presents an improvement of Analia, which is a security system to process results obtained after a vulnerability assessment usin...

2017

Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited. However manual analysis of network testing and vulnerability assessment results is time consuming and demands expertise. This paper presents an improvement of Analia, which is a security system to process results obtained after a vulnerability assessment usin...

2017

Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited. However manual analysis of network testing and vulnerability assessment results is time consuming and demands expertise. This paper presents an improvement of Analia, which is a security system to process results obtained after a vulnerability assessment usin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید