نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

Journal: :Buildings 2021

Adobe construction represents 5.3% of the total Portuguese building stock according to latest National Housing Census. The distribution these adobe buildings is scattered across country, with higher density in central region and Algarve south, where seismic hazard highest. A large proportion are still use for residential commercial purposes historical significance, contributing cultural heritag...

Journal: :Journal of Advanced Transportation 2022

Transportation system has a close bearing on the prosperity of society. However, transportation infrastructures are highly vulnerable to extreme events. Therefore, identifying most critical component is among first priorities network planners and managers. This paper proposes novel framework identify for road system. A key characteristic vulnerability assessment travelers’ response changes in t...

2010
Tong Li Golnaz Elahi Lin Liu Eric S. K. Yu

i* modeling has been used to characterize service-oriented computing in terms of intentional concepts such as agents, goals, dependencies, as well as services they provide or consume. The intentional models provide a rich basis for various security related reasoning, such as vulnerability analysis, attack and countermeasure evaluation, risk assessment, etc. In this work, we aim to explore a rea...

2015
Jürgen Großmann Fredrik Seehusen

Managing cyber security has become increasingly important due to the growing interconnectivity of computerized systems and their use in society. A comprehensive assessment of cyber security can be challenging as its spans across different domains of knowledge and expertise. For instance, identifying cyber security vulnerabilities requires detailed technical expertise and knowledge, while the as...

Journal: :CoRR 2016
François-Xavier Aguessy Olivier Bettan Grégory Blanc Vania Conan Hervé Debar

Because of the threat of advanced multi-step attacks, it is often difficult for security operators to completely cover all vulnerabilities when deploying remediations. Deploying sensors to monitor attacks exploiting residual vulnerabilities is not sufficient and new tools are needed to assess the risk associated to the security events produced by these sensors. Although attack graphs were propo...

2013
Marianthi Theoharidou Nick Papanikolaou Siani Pearson Dimitris Gritzalis

Migrating data, applications or services to the cloud exposes a business to a number of new threats and vulnerabilities, which need to be properly assessed. Assessing privacy risk in cloud environments remains a complex challenge; mitigation of this risk requires trusting a cloud service provider to implement suitable privacy controls. Furthermore, auditors and authorities need to be able to ho...

Journal: :I. J. Network Security 2017
Umesh Kumar Singh Chanchala Joshi

Today’s universities are on the forefront of technological advancement which makes University’ computing environment vulnerable because of its large open networks. This paper analyzed the security threats specifically evolve in University’s network, and with consideration of these issues, proposed risk assessment framework for University computing environment. The proposed framework reduces the...

2013
Tianbo Lu Bing Xu Xiaobo Guo Lingling Zhao Feng Xie

Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. In this paper, a security fr...

2005
Dongfeng Zhu

Title: INTEGRATING SOFTWARE BEHAVIOR INTO DYNAMIC PROBABILISTIC RISK ASSESSMENT Dongfeng Zhu, Doctor of Philosophy 2005 Directed By: Associate Professor Carol Smidts, Professor Ali Mosleh Department of Mechanical Engineering Software plays an increasingly important role in modern safety-critical systems. Although research has been done to integrate software into the classical Probability Risk A...

2011
Jochen Hinkel Reinhard Mechler

Approaches to climate change impact, adaptation and vulnerability assessment: towards a classification framework to serve decision-making.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید