نتایج جستجو برای: nvd

تعداد نتایج: 200  

2017
Sailik Sengupta Satya Gautam Vadlamudi Subbarao Kambhampati Adam Doupé Ziming Zhao Marthony Taguinod Gail-Joon Ahn

The present complexity in designing web applications makes software security a difficult goal to achieve. An attacker can explore a deployed service on the web and attack at his/her own leisure. Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between mul...

Journal: :iranian journal of nursing and midwifery research 0
ziba farajzadegan mohammad arash ramazani parisa mirmoghtadaee amir foroughy mahnaz kelishadi maryam keypour

background: to assess the effect of method of delivery on women's mental health to improve of health status. methods: eleven hundred healthy women who had recently either normal vaginal delivery (nvd) or cesarean section (cs) were studied 6 week after delivery in 2005. the data were collected with using the 36-items short-form (sf-36) questionnaire by interviewing method. spss software version ...

2016
Changwei Liu Anoop Singhal Duminda Wijesekera

Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection systems (IDS) and forensic analysis tools, the evidence can be a false positive or missing. Besides, the number of security events is so large that finding an attack pattern is like finding a needle i...

2016
Umesh Kumar Singh Chanchala Joshi Neha Gaud A. Tripathi

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensure that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estima...

Journal: :Malaysian journal of reproductive health : a publication of the Reproductive Research Centre of the National Population and Family Development Board, Malaysia 1984
Tee E Siong M Kandiah J Ali V Kandiah M R Zahari R Kuladevan Z Hamzah

The study presents recent data on the prevalence and pattern of nutritional anemia in the Maternity Hospital, Kuala Lumpur. A total of 309 pregnant women in their 3rd trimester, of Malay, Chinese and Indian origin from the lower socio-economic strata were randomly selected for the study. Hematological indices (including Hb, PCV, MCHC, and TRBC), serum iron, transferrin saturation and ferritin...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve detection capability and locating precision would warrant their adoption for real-world use. In this paper, we present a detector can simultaneously high precision, dubbed Vulnerability Dee...

A.M. Faghihi M.H Djavareshkian,

A pressure based implicit procedure to solve the Euler and Navier-Stokes equation is developed to predict transonic viscous and inviscid flows around the pitching and heaving airfoils with a high reslution scheme. In this process, nonorthogonal and non moving mesh with collocated finite volume formulation are used. In order to simulate pitching or heaving airfoil, oscillation of flow boundary c...

2007
Mohammad Salim Ahmed Ehab Al-Shaer Latifur Khan

The factors on which security depends are of dynamic nature. These include emergence of new vulnerabilities and threats, policy structure and network traffic. Due to the dynamic nature of these factors, objectively identifying and measuring security metrics is a major challenge. However, such an evaluation can significantly help security professionals in decision making such as choosing between...

2017
Sailik Sengupta Satya Gautam Vadlamudi Subbarao Kambhampati Marthony Taguinod Adam Doupé Ziming Zhao Gail-Joon Ahn

The present complexity in designing web applications makes software security a difficult goal to achieve. An attacker can explore a deployed service on the web and attack at his/her own leisure. Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between mul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید