نتایج جستجو برای: vulnerability

تعداد نتایج: 42681  

2003
H. T. Tian L. S. Huang Z. Zhou J. L. Shan

With the continuous flood of vulnerabilities of computer systems, vulnerability management is a very important task for administrators to keep systems as secure as possible. However current manual vulnerability management by administrators is very time-consuming and error-prone. This paper proposes an open framework of automated vulnerability management that dramatically alleviates the burden o...

Journal: :Rel. Eng. & Sys. Safety 2015
Liu Hong Min Ouyang Srinivas Peeta Xiaozheng He Yongze Yan

The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies ...

Journal: :JCM 2015
Tao Wen Yuqing Zhang Ying Dong Gang Yang

—Security vulnerabilities play an important role in network security. With the development of the network and the increasing number of vulnerabilities, many Quantitative Vulnerability Assessment Standards (QVAS) was proposed in order to enable professionals to prioritize the most important vulnerabilities with limited energy. However, it is difficult to apply QVAS manually due to the large num...

2012
Martín Barrère Gaetan Hurel Remi Badonnel Olivier Festor

Mobile computing devices and the services offered by them are utilized by millions of users on a daily basis. However, they operate in hostile environments getting exposed to a wide variety of threats. Accordingly, vulnerability management mechanisms are highly required. We present in this paper a novel approach for increasing the security of mobile devices by efficiently detecting vulnerable c...

2016
Andrew Driggs

As the proliferation of on-line information storage and interaction continues, so does the continued threat to the security of users and their data. New vulnerabilities are found daily in various pieces of software, used by both users and providers of on-line services, not to mention the myriad of web applications that are not tracked by any central system. Previous research into trends in vuln...

Journal: :avicenna journal of medical biotechnology 0

the astonishing advance of medical science in recent decades has had endless advantages for humans, including improved level of health, prevention of disease and advances in treatment. these advances depend to a great extent on conducting continuous research. however, besides its enormous advantages, the sole interest of medical science undermines the principles of respect for human vulnerabili...

2013
Weifang Shi Weihua Zeng

Reducing human vulnerability to chemical hazards in the industrialized city is a matter of great urgency. Vulnerability mapping is an alternative approach for providing vulnerability-reducing interventions in a region. This study presents a method for mapping human vulnerability to chemical hazards by using clustering analysis for effective vulnerability reduction. Taking the city of Shanghai a...

Journal: :Journal of environmental management 2008
Mohammad N Almasri

Gaza coastal aquifer (GCA) is the major source of fresh water for the 1.5 million residents of Gaza Strip, Palestine. The aquifer is under deteriorating quality conditions mainly due to the excessive application of fertilizers. The intrinsic vulnerability of GCA to contamination was assessed using the well-known DRASTIC method. Detailed analysis of the intrinsic vulnerability map of GCA was car...

2004
J. H. P. Eloff

The focus of this paper is to give an overview of current vulnerability scanner (VS) products and to provide ideas for future improvements. Since each VS product available on the software market today is developed by a separate vendor, there are significant differences in these VS products. VS products differ extensively from each other. The main differences between state of the art VS products...

2017
Stacey Watson Heather Richter Lipford

System administrators make security decisions based on data provided by a variety of tools. Yet too often these tools do not structure the presentation of that data to support the communication and decision making needs of a variety of stakeholders within an organization. For example, consider the task of fixing system vulnerabilities based on network scans. Network vulnerability tools produce ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید