نتایج جستجو برای: vulnerability

تعداد نتایج: 42681  

Journal: :Academic Medicine 2021

2005
Rahul Telang Sunil Wattal

In this paper, we use the event study methodology to examine the role that financial markets play in determining the impact of vulnerability disclosures on software vendors. We collect data from leading national newspapers and industry sources by searching for reports on published software vulnerabilities. Our main result is that vulnerability disclosures do lead to a negative and significant c...

2006
Israt Rayhan Ulrike Grote

This paper aims to analyze how the terms ‘vulnerability’ and ‘poverty’ can be elucidated in a variety of ways, with different meanings, different implications and their interrelationship. The analysis shows poverty is generally associated with deprivation of health, education, food, knowledge, influence over one’s environment and the many other things that make the difference between truly livi...

2006
Rainer Böhme

Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although the discussion on details of responsible vulnerability disclosure is controversial, there is a sort of consensus that better information sharing is socially beneficial. In the recent years we observe the emerging of “vulnerabil...

2007
Cesar Calvo Stefan Dercon

Standard poverty analysis makes statements about deprivation after the veil of uncertainty has been lifted. Nonetheless, the term 'vulnerability' has been used as a tool to remark that uncertainty and risk do matter. In this paper, we define 'vulnerability to poverty' as the magnitude of the threat of poverty, measured exante, before uncertainty is resolved. We describe the desirable properties...

Journal: :Computer Standards & Interfaces 2005
Qiang Tang Chris J. Mitchell

In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.

2014
A. M. Algarni

Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus ...

Journal: :اکو هیدرولوژی 0
گلناز جوانشیر دانشجوی کارشناسی ارشد زمین شناسی زیست محیطی، دانشکدۀ علوم طبیعی، دانشگاه تبریز عطا الله ندیری استادیار گروه علوم زمین، دانشکدۀ علوم طبیعی، دانشگاه تبریز سینا صادق فام گروه مهندسی عمران، دانشکدۀ فنی و مهندسی، دانشگاه مراغه اسفندیار عباس نوین پور استادیار گروه زمین شناسی، دانشکدۀ علوم، دانشگاه ارومیه

increasing growth of population leads to increase in human activities such as agriculture and industry, which these activities increasing and irregular usage of fertilizers, pesticides and insecticides result in soil and groundwater pollution. meanwhile, vulnerability assessment can play important role in the management of polluting activities. in this research a new method has been proposed fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید