نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Journal: :practice in clinical psychology 0
shirin farazmand department of clinical psychology, university of social welfare and rehabilitation sciences, tehran, iran parveneh mohammadkhani department of clinical psychology, university of social welfare and rehabilitation sciences, tehran, iran. abbas pourshahbaz department of clinical psychology, university of social welfare and rehabilitation sciences, tehran, iran behrooz dolatshahi department of clinical psychology, university of social welfare and rehabilitation sciences, tehran, iran

objective: this study aimed to investigate the mediating role of maladaptive schemas between childhood emotional maltreatment and psychological distress among college students. methods: this was a descriptive-correlative and after the fact study. a total of 315 students were selected with multistage cluster sampling from students of tehran universities. the participants completed the lifetime o...

2005
Xinming Ou Sudhakar Govindavajhala Andrew W. Appel

To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among multiple network elements. For a vulnerability analysis tool to be useful in practice, two features are crucial. First, the model used in the analysis must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second, the...

Journal: :Disasters 2005
Kalliopi Sapountzaki

This paper attempts to contribute to international discourse on the responsibility of macro structures (economic and political) and private agencies for the production and distribution of vulnerability. It does so by focusing on an individual economic entity, small manufacturing firms (SMFs), in a specific location, western Athens, Greece. By evaluating the losses that SMFs sustained in the ear...

Journal: :International Journal of Online Engineering (iJOE) 2017

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2013

Journal: :Revista Brasileira de Enfermagem 2019

Journal: :Transactions on computational science and computational intelligence 2021

The use of container technology has skyrocketed during the last few years, with Docker as leading platform. Docker’s online repository for publicly available images, called Hub, hosts over 3.5 million images at time writing, making it world’s largest community images. We perform an extensive vulnerability analysis 2500 It is particular interest to this type because landscape a rapidly changing ...

2016
Evelyne Durocher Ryoa Chung Christiane Rochon Matthew Hunt

Vulnerability is a central concept in humanitarian aid. Discussions of vulnerability in disaster response literature and guidelines for humanitarian aid range from considerations of a universal human vulnerability, to more nuanced examinations of how particular characteristics render individuals more or less at risk. Despite its frequent use, there is a lack of clarity about how vulnerability i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید