نتایج جستجو برای: vulnerability mitigation
تعداد نتایج: 74066 فیلتر نتایج به سال:
Industrial accidents increasingly threaten society and economy; the increasing exposure and vulnerability of our modern interlaced societies contributes to intensifying their impact. Critical Infrastructures (CIs) have a prominent role, since they are vital for the welfare of the population and essential for the economic growth. As hazards are hard to predict, decision-makers need to implement ...
The number and magnitude of devastating natural and human events make it imperative that we actively and systematically estimate the costs and benefits of policy decisions in affected localities, regions, states, and nations. Such strategic risk management preparedness efforts should forecast well into the future and include scenarios with and without enhanced engineered structures; with reduce...
Effective action on climate change health impacts and vulnerability will require systems approaches and integrated policy and planning responses from a range of government agencies. Similar responses are needed to address other complex problems, such as the obesity epidemic. Local government, with its focus on the governance of place, will have a key role in responding to these convergent agend...
Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnera...
Lifelines are essential to urban life as they include all kinds of facilities and systems as water, gas, fuel, power, communication and transportation. The scope of this paper is to evaluate the influence of the uncertainties of seismic load and damage state definition in system’s reliability. At first, a rapid pre-estimation of the reliability of the system just after the earthquake is conduct...
One area of active interest in the GNSS community is determining the vulnerability of multi-antenna signal processing algorithms given calibration errors in antennas and analog front-end hardware. Errors introduced by the antennas or by the analog hardware that are not completely mitigated by software or calibration may lead to degradation in steering-vector accuracy. Of interest are the charac...
Coasts are highly dynamic and geo-morphologically complex systems that exposed to several factors such as waves, extreme meteorological events climate change. It is also well-recognized coastal zones, characterized by an increasing population growth, vulnerable In addition, erosion, resulting from natural environment changes human activities, acts worldwide. Consequently, it necessary quantify ...
BIP70 is a community-accepted Payment Protocol standard that governs how merchants and customers perform payments in Bitcoin. This standard is supported by most major wallets and the two dominant Payment Processors: Coinbase and BitPay, who collectively provide the infrastructure for accepting Bitcoin as a form of payment to more than 100,000 merchants. In this paper, we present new attacks on ...
Climate scientists note that the effects of climate change vary regionally. Citizen willingness to absorb the costs of adaptation and mitigation policies may correspond with these place-specific effects. Geographic information systems (GIS) analytic techniques are used to map and measure survey respondents’ climate change risk at various levels of spatial resolution and precision. Spatial data ...
Today’s computer systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately assess the security of networked systems, one must understand how vulnerabilities can be combined to stage an attack. We model such composit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید