نتایج جستجو برای: vulnerability
تعداد نتایج: 42681 فیلتر نتایج به سال:
In this paper, we use the event study methodology to examine the role that financial markets play in determining the impact of vulnerability disclosures on software vendors. We collect data from leading national newspapers and industry sources by searching for reports on published software vulnerabilities. Our main result is that vulnerability disclosures do lead to a negative and significant c...
This paper aims to analyze how the terms ‘vulnerability’ and ‘poverty’ can be elucidated in a variety of ways, with different meanings, different implications and their interrelationship. The analysis shows poverty is generally associated with deprivation of health, education, food, knowledge, influence over one’s environment and the many other things that make the difference between truly livi...
Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although the discussion on details of responsible vulnerability disclosure is controversial, there is a sort of consensus that better information sharing is socially beneficial. In the recent years we observe the emerging of “vulnerabil...
Standard poverty analysis makes statements about deprivation after the veil of uncertainty has been lifted. Nonetheless, the term 'vulnerability' has been used as a tool to remark that uncertainty and risk do matter. In this paper, we define 'vulnerability to poverty' as the magnitude of the threat of poverty, measured exante, before uncertainty is resolved. We describe the desirable properties...
In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus ...
increasing growth of population leads to increase in human activities such as agriculture and industry, which these activities increasing and irregular usage of fertilizers, pesticides and insecticides result in soil and groundwater pollution. meanwhile, vulnerability assessment can play important role in the management of polluting activities. in this research a new method has been proposed fo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید