نتایج جستجو برای: vulnerability assessment
تعداد نتایج: 598326 فیلتر نتایج به سال:
Adobe construction represents 5.3% of the total Portuguese building stock according to latest National Housing Census. The distribution these adobe buildings is scattered across country, with higher density in central region and Algarve south, where seismic hazard highest. A large proportion are still use for residential commercial purposes historical significance, contributing cultural heritag...
Transportation system has a close bearing on the prosperity of society. However, transportation infrastructures are highly vulnerable to extreme events. Therefore, identifying most critical component is among first priorities network planners and managers. This paper proposes novel framework identify for road system. A key characteristic vulnerability assessment travelers’ response changes in t...
i* modeling has been used to characterize service-oriented computing in terms of intentional concepts such as agents, goals, dependencies, as well as services they provide or consume. The intentional models provide a rich basis for various security related reasoning, such as vulnerability analysis, attack and countermeasure evaluation, risk assessment, etc. In this work, we aim to explore a rea...
Managing cyber security has become increasingly important due to the growing interconnectivity of computerized systems and their use in society. A comprehensive assessment of cyber security can be challenging as its spans across different domains of knowledge and expertise. For instance, identifying cyber security vulnerabilities requires detailed technical expertise and knowledge, while the as...
Because of the threat of advanced multi-step attacks, it is often difficult for security operators to completely cover all vulnerabilities when deploying remediations. Deploying sensors to monitor attacks exploiting residual vulnerabilities is not sufficient and new tools are needed to assess the risk associated to the security events produced by these sensors. Although attack graphs were propo...
Migrating data, applications or services to the cloud exposes a business to a number of new threats and vulnerabilities, which need to be properly assessed. Assessing privacy risk in cloud environments remains a complex challenge; mitigation of this risk requires trusting a cloud service provider to implement suitable privacy controls. Furthermore, auditors and authorities need to be able to ho...
Today’s universities are on the forefront of technological advancement which makes University’ computing environment vulnerable because of its large open networks. This paper analyzed the security threats specifically evolve in University’s network, and with consideration of these issues, proposed risk assessment framework for University computing environment. The proposed framework reduces the...
Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. In this paper, a security fr...
Title: INTEGRATING SOFTWARE BEHAVIOR INTO DYNAMIC PROBABILISTIC RISK ASSESSMENT Dongfeng Zhu, Doctor of Philosophy 2005 Directed By: Associate Professor Carol Smidts, Professor Ali Mosleh Department of Mechanical Engineering Software plays an increasingly important role in modern safety-critical systems. Although research has been done to integrate software into the classical Probability Risk A...
Approaches to climate change impact, adaptation and vulnerability assessment: towards a classification framework to serve decision-making.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید