نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

Journal: :CoRR 2013
Vena Pearl Bongolan Florencio C. Ballesteros Joyce Anne M. Banting Aina Marie Q. Olaes Charlymagne R. Aquino

A conceptual area is divided into units or barangays, each was allowed to evolve under a physical constraint. A risk assessment method is then used to identify the flood risk in each community using the following risk factors: the area's urbanized area ratio, literacy rate, mortality rate, poverty incidence, radio/TV penetration, and state of structural and non-structural measures. Vulnerabilit...

2008
Jared Holsopple Shanchieh Jay Yang Brian Argauer

Much research has been put forth towards detection, correlating, and prediction of cyber attacks in recent years. As this set of research progresses, there is an increasing need for contextual information of a computer network to provide an accurate situational assessment. Typical approaches adopt contextual information as needed; yet such ad hoc effort may lead to unnecessary or even conflicti...

2003
Peter Szolovits Min Wu

Information routinely collected by health care organizations is used by researchers to analyze the causes of illness and evaluate the effectiveness of potential cures. Medical information sharing systems are built to encourage hospitals to contribute patient data for use in clinical studies. These organizations possess a wide variety of environments and risk assessments, and require sufficient ...

Journal: :J. Network and Computer Applications 2011
Frank A. Zdarsky Sebastian Robitzsch Albert Banchs

Radio links are used to provide backhaul connectivity for base stations of mobile networks, in cases in which cable-based alternatives are not available and cannot be deployed in an economic or timely manner. While such wireless backhauls have been predominantly used in redundant tree and ring topologies in the past, mobile network operators have become increasingly interested in meshed topolog...

2010
P. Moeinzadeh A. Hajfathaliha

Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set...

Journal: :Eur. J. Comb. 1998
Marialuisa J. de Resmini Nicholas Hamilton

In a finite projective plane of order q, a k-arc is a set of k points no three of which are collinear [9]. A k-arc is complete if it is not contained in a (k+1)-arc. The maximum number of points a k-arc can have is q + 2 if q is even, and q + 1 if q is odd. A (q + 1)-arc is known as an oval. A (q + 2)-arc is known as a hyperoval, in which case every line meets the set in 0 or 2 points. Every ov...

A. Kaveh, R. Sheikholeslami ,

The main functional purpose of a water distribution network is to transport water from a source to several domestic and industrial units while at the same time satisfying various requirements on hydraulic response. All the water distribution networks perform two basic operations: firstly the water network needs to deliver adequate amounts of water to meet specific requirements, and secondly the...

1998
Richard S.J. Tol Samuel Fankhauser

The paper provides an overview of attempts to represent climate change impact in over twenty integrated assessment models (IAMs) of climate change. Focusing on policy optimization IAMs, the paper critically compares modeling solutions, discusses alternatives and outlines important areas for improvement. Perhaps the most crucial area of improvement concerns the dynamic representation of impact, ...

2010
Paul Rohmeyer Tal Ben-Zvi

This paper explores the use of risk management techniques to promote the design of resilient services. Success in achieving any benefit from a new service will be directly affected by the resiliency of the supporting service architecture including technical and non-technical domains. The concept of resiliency in services and enterprises is examined. We present a framework to analyze risks and t...

2014
Francesca Matarese Patrizia Montefusco José Neves André Rocha

The objective of this paper is the definition of a new methodology for carrying out security risk assessment in the air traffic management (ATM) domain so as to enhance security awareness and integrate secure and cost-effective design objectives. This process is carried out by modelling the system, identifying the assets, threats and vulnerabilities, prioritizing the threats and proposing cost-...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید