نتایج جستجو برای: vulnerability measures
تعداد نتایج: 394565 فیلتر نتایج به سال:
The function or performance of a network is strongly dependent on its robustness, quantifying the ability to continue functioning under perturbations. While wide variety robustness metrics have been proposed, they their respective limitations. In this paper, we propose use forest index as measure which overcomes deficiencies existing metrics. Using such an optimization criterion, and study prob...
Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure V...
Reliable electrical power supply is a prerequisite for the modernsociety, and if it fails, it can cause severe consequences in terms of economiclosses and even fatalities. It is thus important to analyse the vulnerabilityof the electric power system. Network analysis has previously been used toanalyse the vulnerability of electric transmission systems. Recent events inSweden...
The purpose of this prospective study was to examine whether explicit and implicit vulnerability associations before and after trauma exposure predict the onset and persistence of post-traumatic stress disorder (PTSD) symptoms. The implicit association test (IAT) was modified to assess associations of self with vulnerability related cues. Dutch soldiers completed the IAT 6 weeks before being de...
We present a novel approach to quantify the vulnerability of a complex network, i.e., the capacity of a graph to maintain its functional performance under random damages or malicious attacks. The proposed measure represents a multiscale evaluation of vulnerability, and makes use of combined powers of the links' betweenness. We show that the proposed approach is able to properly describe some ca...
BACKGROUND During the course of an influenza pandemic, governments know relatively little about the possibly changing influence of government trust, risk perception, and receipt of information on the public's intention to adopt protective measures or on the acceptance of vaccination. This study aims to identify and describe possible changes in and factors associated with public's intentions dur...
This paper examines several security measures that have been implemented in OpenSSH. OpenSSH’s popularity, and the necessity for the server to wield root privileges, have made it a high-value target for attack. Despite initial and ongoing code audits, OpenSSH has suffered from a number of security vulnerabilities over its 7.5 year life. This has prompted the developers to implement several defe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید