نتایج جستجو برای: vulnerability assessment
تعداد نتایج: 598326 فیلتر نتایج به سال:
The growing interest in adaptation policies in the context of climate change, especially among developing countries, is making vulnerability assessment a very active area of research. Understanding present day vulnerabilities and adaptation potential among local communities is increasingly being considered as a pre-requisite to such assessments. This paper focuses on understanding and quantifyi...
vulnerability and contamination risk assessment is of great importance in karst aquifer management. because of vastness of karst in zagros, natural conditions and human activity within the region of aquifer, pollution emission has become one of the most important challenges in front of zagros aquifers. the purpose of this study is to assess marab aquifer vulnerability, using riske model and, de...
Although the vulnerability assessment of forest parks is used to determine the threats they face, a rapid and holistic framework has not been established well. The primary objective of this study is to adopt a framework for rapid assessment of forest parks vulnerability, examined in Lavizan forest park in Tehran (Iran) as the case study. The vulnerability assessment has been conducted, using th...
We consider the existence of blocking semiovals in nite projective planes which have intersection sizes 1; m + 1 or n + 1 with the lines of the plane, for 1 m < n. For those prime powers q 1024, in almost all cases, we are able to show that, apart from a trivial example, no such blocking semioval exists in a projective plane of order q. We are able to prove also, for general q, that if q 2 + q ...
Abstract—Presented article outlines a rationale, why it is necessary to develop competence about infrastructure risk in water transport. Climate changes are evident and require special attention and global monitoring. Current risk assessment methods for Inland waterway transport just consider some dramatic events. We present a new method for the assessment of risk and vulnerability of inland wa...
Computer security vulnerabilities badly compromise the system security. To profoundly understand the causes of known vulnerabilities and prevent them, this paper develops a new taxonomic character, and then integrates a privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute. This taxonomy greatly contributes to further researches of security risk assessme...
We propose the set of operations for querying the conceptual schema of an objectoriented database. The operations form the basis of an algebra for objects called OVAL. They are de ned using the constructs introduced for our formalization of the object-oriented database model. The operations allow a user to query: (i) associations among individual objects, (ii) relationships between individual o...
Although the vulnerability assessment of forest parks is used to determine the threats they face, a rapid and holistic framework has not been established well. The primary objective of this study is to adopt a framework for rapid assessment of forest parks vulnerability, examined in Lavizan forest park in Tehran (Iran) as the case study. The vulnerability assessment has been conducted, using th...
Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models
Purpose In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors wrongly identified or unidentified vulnerabilities can occur as uncertain data are used. Furthermore, businesses’ security needs are not considered sufficiently. Hence, security functions may not protect business assets suf...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید