نتایج جستجو برای: vulnerability measures
تعداد نتایج: 394565 فیلتر نتایج به سال:
OBJECTIVE Evidence regarding post traumatic growth (PTG) as a predictor of future reductions in distress has been inconclusive. The purpose of this study was to examine this relationship in a multiple-observation prospective study, to provide a more rigorous test of prediction over time. This longitudinal study extended previous work by taking into account perceptions of vulnerability and explo...
Groundwater is the main source of water supply in Jordan. Due to lower precipitation rates in recent years, the surface water is increasingly limited. Research on groundwater vulnerability helps protect this main source of water supply and assists in the development of plans to confront the deterioration and contamination of aquifers from wastewater and agricultural activities in order to prote...
The concept of vulnerability is delimited by dynamic social and multigenerational processes involving at least three dimensions: exposure to risk trajectories, internal and external capabilities of reaction and possibilities of adaptation based on both the intensity of risk and the resilience of people. In order to identify and describe the synthetic indices of vulnerability, there was an integ...
A hierarchical family of Damage Probability Matrices (DPM) has been derived in this paper from the ones implicitly contained in the EMS-98 Macroseismic Scale for 6 vulnerability classes. To this aim the linguistic definitions provided by the scale, and the associated fuzzy sub-sets of the percentage of buildings, have been completed according to reliable hypotheses. A parametric representation ...
Nowadays attacks are becoming increasingly frequent and sophisticated, and they are also becoming increasingly interconnected. Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network. It is therefore in great need of performing vulnerability analysis to do security analysis first a...
Epidemiological and large scale treatment studies within smoking research have utilized many one-item screening items to examine the influence of current depressive symptoms on smoking behavior and quitting. Little is known about that concurrent validity of screening items that may reflect depression vulnerability independent of current symptoms. The present paper evaluated the concurrent valid...
A classification model based on the Majority Rule Sorting method has been previously proposed by the authors to evaluate the vulnerability of safety-critical systems (e.g., nuclear power plants) with respect to malevolent intentional acts. In this paper, we consider a classification model previously proposed by the authors based on the Majority Rule Sorting method to evaluate the vulnerability ...
To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among multiple network elements. For a vulnerability analysis tool to be useful in practice, two features are crucial. First, the model used in the analysis must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second, the...
We examine the cost-effectiveness of improvements in woodframe buildings. These include retrofits, redesign measures, and improved quality in 19 hypothetical woodframe dwellings. We estimated cost-effectiveness for each improvement and each zip code in California. The dwellings were designed under the CUREE-Caltech Woodframe Project. Costs and seismic vulnerability were determined on a componen...
Purpose – The purpose of this paper is to investigate the Web vulnerability challenges at European library Web sites and how these issues can affect the data protection of their patrons. Design/methodology/approach – A Web vulnerability testing tool was used to analyze 80 European library sites in four countries to determine how many security vulnerabilities each had and what were the most comm...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید