نتایج جستجو برای: vulnerability measures

تعداد نتایج: 394565  

Journal: :Health psychology : official journal of the Division of Health Psychology, American Psychological Association 2017
Ashley Wei-Ting Wang Cheng-Shyong Chang Shou-Tung Chen Dar-Ren Chen Fang Fan Charles S Carver Wen-Yau Hsu

OBJECTIVE Evidence regarding post traumatic growth (PTG) as a predictor of future reductions in distress has been inconclusive. The purpose of this study was to examine this relationship in a multiple-observation prospective study, to provide a more rigorous test of prediction over time. This longitudinal study extended previous work by taking into account perceptions of vulnerability and explo...

2015
Majed Ibrahim Barbara Koch

Groundwater is the main source of water supply in Jordan. Due to lower precipitation rates in recent years, the surface water is increasingly limited. Research on groundwater vulnerability helps protect this main source of water supply and assists in the development of plans to confront the deterioration and contamination of aquifers from wastewater and agricultural activities in order to prote...

Journal: :Ciencia & saude coletiva 2015
Lívia Rejane Miguel Amaral Schumann Leides Baroso Azevedo Moura

The concept of vulnerability is delimited by dynamic social and multigenerational processes involving at least three dimensions: exposure to risk trajectories, internal and external capabilities of reaction and possibilities of adaptation based on both the intensity of risk and the resilience of people. In order to identify and describe the synthetic indices of vulnerability, there was an integ...

2007
Alberto Bernardini Sonia Giovinazzi Sergio Lagomarsino Sonia Parodi

A hierarchical family of Damage Probability Matrices (DPM) has been derived in this paper from the ones implicitly contained in the EMS-98 Macroseismic Scale for 6 vulnerability classes. To this aim the linguistic definitions provided by the scale, and the associated fuzzy sub-sets of the percentage of buildings, have been completed according to reliable hypotheses. A parametric representation ...

2009
Xuejiao Liu Debao Xiao Nian Ma Jie Yu

Nowadays attacks are becoming increasingly frequent and sophisticated, and they are also becoming increasingly interconnected. Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network. It is therefore in great need of performing vulnerability analysis to do security analysis first a...

Journal: :Addictive behaviors 2007
Dennis E McChargue Jessica Werth Cook

Epidemiological and large scale treatment studies within smoking research have utilized many one-item screening items to examine the influence of current depressive symptoms on smoking behavior and quitting. Little is known about that concurrent validity of screening items that may reflect depression vulnerability independent of current symptoms. The present paper evaluated the concurrent valid...

Journal: :Rel. Eng. & Sys. Safety 2016
Tai-Ran Wang Nicola Pedroni Enrico Zio

A classification model based on the Majority Rule Sorting method has been previously proposed by the authors to evaluate the vulnerability of safety-critical systems (e.g., nuclear power plants) with respect to malevolent intentional acts. In this paper, we consider a classification model previously proposed by the authors based on the Majority Rule Sorting method to evaluate the vulnerability ...

2005
Xinming Ou Sudhakar Govindavajhala Andrew W. Appel

To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among multiple network elements. For a vulnerability analysis tool to be useful in practice, two features are crucial. First, the model used in the analysis must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second, the...

2005
Keith A. Porter Charles R. Scawthorn James L. Beck J. L. BECK

We examine the cost-effectiveness of improvements in woodframe buildings. These include retrofits, redesign measures, and improved quality in 19 hypothetical woodframe dwellings. We estimated cost-effectiveness for each improvement and each zip code in California. The dwellings were designed under the CUREE-Caltech Woodframe Project. Costs and seismic vulnerability were determined on a componen...

Journal: :Library Hi Tech 2010
Joanne Kuzma

Purpose – The purpose of this paper is to investigate the Web vulnerability challenges at European library Web sites and how these issues can affect the data protection of their patrons. Design/methodology/approach – A Web vulnerability testing tool was used to analyze 80 European library sites in four countries to determine how many security vulnerabilities each had and what were the most comm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید