نتایج جستجو برای: vulnerability

تعداد نتایج: 42681  

2017
Moawia Alghalith Cuizhen Niu Wing-Keung Wong

In this paper, we analyze the impacts of joint energy and output prices uncertainties on the inputs demands in a mean-variance framework. We find that the concepts of elasticities and variance vulnerability play important roles in the comparative statics analysis. If the firms’ preferences exhibit variance vulnerability, increasing the variance of energy price will necessarily cause the risk av...

2011
David G. Robinson J. Alex Halderman

Research about weaknesses in deployed electronic voting systems raises a variety of pressing ethical concerns. In addition to ethical issues common to vulnerability research, such as the potential harms and beneifts of vulnerability disclosure, electronic voting researchers face questions that flow from the unique and important role voting plays in modern democratic societies. Should researcher...

Journal: :Comput. Syst. Sci. Eng. 2009
Yang Xiang Xiang Fan Wen Tao Zhu

This paper serves worm defenders’ objective to improve their immunity to future active worms by giving them a deep insight into propagation characteristics of active worms from a worm authors’ perspective. Active worms self-propagate across networks by employing scanning, pre-generated target list, or internally generated target lists as their target discovery technique. We find target acquisit...

Journal: :I. J. Network Security 2013
Christos K. Dimitriadis

Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. The scope of this paper is to publish these vulnerabilities towards the enhancement...

Journal: :IJWMC 2007
William Stewart Yang Xiao Bo Sun Hsiao-Hwa Chen

The IEEE 802.15.3 specification is proposed for short-range high-speed Wireless Personal Area Networks (WPANs). Furthermore, it is proposed by the IEEE 802.15.3 a task group for Ultra-Wideband (UWB) transmission, which is an emerging wireless technology for future indoor and outdoor applications. This paper gives a survey on various security aspects and mechanisms in the IEEE 802.15.3 WPANs. It...

2001
Hilary K. Browne William A. Arbaugh John McHugh William L. Fithen

We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumula...

Journal: :Social Choice and Welfare 2011
Indranil Dutta James Foster Ajit Mishra

There is a growing interest on dynamic and broader concepts of deprivation such as vulnerability, which takes in to account the destitution of individuals from future shocks. We use the framework of decision making under uncertainty to arrive at a new measure of vulnerability to poverty. We highlight the importance of current standard of living to better capture the notion of vulnerability. In ...

2012
Patrick Guillaumont Laurent Wagner

This paper confronts three conundrums. First, does the relationship between aid and growth fade over time when aid is successful? Second, why are aid inflows neglected in the literature on growth acceleration (or episodes). Third, why is country vulnerability overlooked in the same literature? Our purpose is to address these puzzles, and in doing so two hypotheses are formulated and tested. Fir...

2005
Elisabeth Schröder-Butterfill

This paper is concerned with three related questions: How can vulnerable older people in a contemporary developing society be identified? What are the processes leading to their vulnerability? What is the role of older people’s social networks in determining vulnerability or security? Addressing these questions in full requires consideration of a range of different vulnerabilities and pathways ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید