نتایج جستجو برای: vulnerability mitigation
تعداد نتایج: 74066 فیلتر نتایج به سال:
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system’s secur...
4.11.1 Ecological Interactions 118 4.11.1.1 Pollination Services 118 4.11.1.2 Sensitivity/Vulnerability of Pollination Services 119 4.11.1.2.1 Temporal Mismatch 119 4.11.1.2.2 Spatial Mismatch 120 4.11.1.2.3 Alteration of Pollinator Networks 121 4.11.1.2.4 Simulated Biodiversity Loss or Phenological Mismatch 121 4.11.1.2.5 Network Comparison Post Habitat-Alteration 122 4.11.2 Ecosystem Service ...
The issue of spatial equity Nature-Based Solutions in cities generally concerns the distribution their benefits to local residents and other city users. In context flood risk management, planners are challenged identify effective mitigation adaptation measures that can generate higher number people and, more specifically, with highest levels exposure vulnerability. To address these issues, an e...
Space weather driven by solar activity can induce geomagnetic disturbances at the Earth's surface that can affect power transmission systems. Variations in the geomagnetic field result in geomagnetically induced currents that can enter the system through its grounding connections, saturate transformers and lead to system instability and possibly collapse. This study analyzes the impact of extre...
The purpose of this research is to examine how cost-benefit analysis (CBA) can be utilized to evaluate the attractiveness of mitigation for lifeline systems subject to earthquake ground motion. We propose a framework for the CBA that can be used in conjunction with work being completed by other researchers at MCEER (Shinozuka et al., 2000; Chang et al., 2000). With their development of fragilit...
The policy debate on climate change distinguishes two generic response options. The first (and more prominent) option is mitigation. Mitigation addresses the causes of climate change by reducing the emission of harmful greenhouse gases (GHGs). The second response is adaptation. Adaptation deals with the consequences of climate change and seeks to reduce the vulnerability of human and natural sy...
The catchment of the River Thames, the principal river system in southern England, provides the main water supply for London but is highly vulnerable to changes in climate, land use and population. The river is eutrophic with significant algal blooms with phosphorus assumed to be the primary chemical indicator of ecosystem health. In the Thames Basin, phosphorus is available from point sources ...
Rural counties face unique challenges with regard to disaster vulnerability and resilience. We compared the quality of hazard mitigation plans (HMPs) completed in accordance with provisions of the Disaster Mitigation Act of 2000 from 21 urban and 36 rural counties in three southeastern states. HMPs were content analyzed to calculate a score for six principles of plan quality. Generalized linear...
The U.S. Department of Homeland Security (DHS) is investing billions of dollars to protect us from terrorist attacks and their expected damage (i.e., risk). We present prescriptive optimization models to guide these investments. Our primary goal is to recommend investments in a set of available defense options; each of these options can reduce our vulnerability to terrorist attack, or enable fu...
The purpose of this research is to examine how cost-benefit analysis (CBA) can be utilized to evaluate the attractiveness of mitigation for lifeline systems subject to earthquake ground motion. We propose a framework for the CBA that can be used in conjunction with work being completed by other researchers at MCEER (Shinozuka et al., 2000; Chang et al., 2000). With their development of fragilit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید