نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

2009
John A. Caldwell

Form Approved OMS No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this coll...

Journal: :practice in clinical psychology 0
ebrahim soltani azemat department of clinical psychology, university of social welfare and rehabilitation sciences, tehran, iran. abolfazl mohammadian department of clinical psychology, university of social welfare and rehabilitation sciences, tehran, iran. nasrin heydari dolat abadi department of psychology, faculty of humanities and social sciences, science and research branch, islamic azad university, tehran, iran. parvaneh mohammadkhani social welfare management research center, university of social welfare and rehabilitation sciences, koodakyar ave., daneshjoo blvd., evin, tehran, iran.

objective: sexual addiction is a psychiatric disorder with unpleasant personal, inter-personal, legal, social, and physical outcomes for the patients. the cycle of this disorder is based on a false belief system known as early maladaptive schemas. this study aimed to examine and compare maladaptive cognitive schemas in sex addicts and normal people. methods: in the present study, a causal-compa...

2005
Steven A. Harp Johnathan Gohde Thomas Haigh Mark S. Boddy

As networked systems become more complex, and they support more critical applications, there is a compelling need to augment the Red Team approach to vulnerability analysis with more formal, automated methods. Artificial Intelligence (AI) Planning, with its welldeveloped theory and rich set of tools, offers an attractive approach. By adopting this approach we have been able to generate attack g...

2008
David Brumley Randal E. Bryant

In this thesis, we develop techniques for vulnerability analysis and defense that only require access to vulnerable programs in binary form. Our approach does not use or require source code. We focus on a binary-centric approach since everyone typically has access to the binary code for the programs they run. Thus, our approach is applicable to a wider audience than previous approaches that req...

Journal: :Aging cell 2013
Mirre J P Simons Wouter Koch Simon Verhulst

Dietary restriction (DR) extends lifespan in multiple species from various taxa. This effect can arise via two distinct but not mutually exclusive ways: a change in aging rate and/or vulnerability to the aging process (i.e. initial mortality rate). When DR affects vulnerability, this lowers mortality instantly, whereas a change in aging rate will gradually lower mortality risk over time. Unrave...

2018
Yang Zhang Jing Shen Yu Li

Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the B...

حسینی, فرزانه السادات, زنگانه, احمد, سلطانی فرد, هادی, نوده, مرضیه,

As an important factor to be considered, rapid population growth, lack of resources and appropriate management has led the natural hazards threatening human societies increasingly. Although it is impossible to eliminate the effects of natural hazards, however, risk reduction and risk cities against natural phenomena has become the main topics of urban planning and design in recent years. Iran i...

Journal: :PLoS ONE 2008
Melissa K. Andrew Arnold B. Mitnitski Kenneth Rockwood

BACKGROUND Social vulnerability is related to the health of elderly people, but its measurement and relationship to frailty are controversial. The aims of the present study were to operationalize social vulnerability according to a deficit accumulation approach, to compare social vulnerability and frailty, and to study social vulnerability in relation to mortality. METHODS AND FINDINGS This i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید