نتایج جستجو برای: vulnerability assessment
تعداد نتایج: 598326 فیلتر نتایج به سال:
A conceptual area is divided into units or barangays, each was allowed to evolve under a physical constraint. A risk assessment method is then used to identify the flood risk in each community using the following risk factors: the area's urbanized area ratio, literacy rate, mortality rate, poverty incidence, radio/TV penetration, and state of structural and non-structural measures. Vulnerabilit...
Much research has been put forth towards detection, correlating, and prediction of cyber attacks in recent years. As this set of research progresses, there is an increasing need for contextual information of a computer network to provide an accurate situational assessment. Typical approaches adopt contextual information as needed; yet such ad hoc effort may lead to unnecessary or even conflicti...
Information routinely collected by health care organizations is used by researchers to analyze the causes of illness and evaluate the effectiveness of potential cures. Medical information sharing systems are built to encourage hospitals to contribute patient data for use in clinical studies. These organizations possess a wide variety of environments and risk assessments, and require sufficient ...
Radio links are used to provide backhaul connectivity for base stations of mobile networks, in cases in which cable-based alternatives are not available and cannot be deployed in an economic or timely manner. While such wireless backhauls have been predominantly used in redundant tree and ring topologies in the past, mobile network operators have become increasingly interested in meshed topolog...
Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set...
In a finite projective plane of order q, a k-arc is a set of k points no three of which are collinear [9]. A k-arc is complete if it is not contained in a (k+1)-arc. The maximum number of points a k-arc can have is q + 2 if q is even, and q + 1 if q is odd. A (q + 1)-arc is known as an oval. A (q + 2)-arc is known as a hyperoval, in which case every line meets the set in 0 or 2 points. Every ov...
The main functional purpose of a water distribution network is to transport water from a source to several domestic and industrial units while at the same time satisfying various requirements on hydraulic response. All the water distribution networks perform two basic operations: firstly the water network needs to deliver adequate amounts of water to meet specific requirements, and secondly the...
The paper provides an overview of attempts to represent climate change impact in over twenty integrated assessment models (IAMs) of climate change. Focusing on policy optimization IAMs, the paper critically compares modeling solutions, discusses alternatives and outlines important areas for improvement. Perhaps the most crucial area of improvement concerns the dynamic representation of impact, ...
This paper explores the use of risk management techniques to promote the design of resilient services. Success in achieving any benefit from a new service will be directly affected by the resiliency of the supporting service architecture including technical and non-technical domains. The concept of resiliency in services and enterprises is examined. We present a framework to analyze risks and t...
The objective of this paper is the definition of a new methodology for carrying out security risk assessment in the air traffic management (ATM) domain so as to enhance security awareness and integrate secure and cost-effective design objectives. This process is carried out by modelling the system, identifying the assets, threats and vulnerabilities, prioritizing the threats and proposing cost-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید