نتایج جستجو برای: vulnerability mitigation
تعداد نتایج: 74066 فیلتر نتایج به سال:
A vulnerability discovery model describes the variation in the vulnerability discovery rate during the lifetime of a software system and can be used to assess risk and to evaluate possible mitigation approaches. A few vulnerability discovery models have recently been proposed. The AML Logistic model has been found to provide the best fit in several cases. Weibull distribution, which can model a...
This study aims to develop a new procedure that combines multi-criteria spatial vulnerability analysis with the traditional linear probabilistic risk approach. This approach is named integrated fuzzy flood vulnerability assessment because it combines the watershed-based vulnerability framework with stream-based risk analysis. The Delphi technique and pressure-state-impact-response framework are...
This paper presents a study on determining the degree of effectiveness of earthquake risk mitigation measures and how to prioritize such efforts in developing countries. In this paper a model is proposed for optimizing funds allocation towards risk reduction measures (building retrofitting) and reconstruction process after potential earthquakes in a regional level. The proposed model seeks opti...
The development of cyber-assured systems is a challenging task, particularly due to the cost and complexities associated with modern hybrid networks architectures, as well recent advancements in cloud computing. For this reason, early detection vulnerabilities threat strategies are vital for minimising risks enterprise configured variety node types, which called networks. Existing vulnerability...
VDES R-Mode aims at providing a contingency maritime positioning and navigation system when the operation of Global Navigation Satellite Systems (GNSS) is disrupted. However, R-Mode, similarly to GNSS, can itself also be subject different types attacks, such as jamming or spoofing. In this paper, we evaluate vulnerabilities discuss effectiveness cost countermeasures. The outcome cost-benefit an...
Hospital planning for chemical or radiological events is essential but all too often treated as a low priority. Although some other types of disasters like hurricanes and tornadoes may be more frequent, chemical and radiological emergencies have the potential for major disruptions to clinical care. Thorough planning can mitigate the impact of a chemical or radiological event. Planning needs to ...
The information security risk assessment is investigated from perspectives of most advanced probabilistic risk assessment (PRA) for nuclear power plants. Accident scenario enumeration by initiating events, mitigation systems and event trees are first described and demonstrated. Assets, confidentiality, integrity, availability, threats, vulnerabilities, impacts, likelihoods, and safeguards are r...
A coastal community vulnerability index (CCVI) was constructed to evaluate the vulnerability of coastal communities (Buhangin, Pingit, Reserva, Sabang, and Zabali) in the municipality of Baler, Aurora, Philippines. This index was composed of weighted averages of seven vulnerability factors namely geographical, economic and livelihood, food security, environmental, policy and institutional, demo...
Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique for the broadband wireless communication system. However, a special problem in OFDM is its vulnerability to frequency offset errors due to which the orthogonality is destroyed that result in Intercarrier Interference (ICI). ICI causes power leakage among subcarriers thus degrading the system performance. This paper will ...
The decisions that individuals make when recovering from and adapting to repeated hazards affect a region's vulnerability in future hazards. As such, community vulnerability is not a static property but rather a dynamic property dependent on behavioral responses to repeated hazards and damage. This paper is the first of its kind to build a framework that addresses the complex interactions betwe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید