نتایج جستجو برای: vulnerability measures

تعداد نتایج: 394565  

Journal: :IEEE Transactions on Information Forensics and Security 2023

The function or performance of a network is strongly dependent on its robustness, quantifying the ability to continue functioning under perturbations. While wide variety robustness metrics have been proposed, they their respective limitations. In this paper, we propose use forest index as measure which overcomes deficiencies existing metrics. Using such an optimization criterion, and study prob...

Journal: :Journal of the National Science Foundation of Sri Lanka 2006

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2007
Barry Charles Ezell

Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure V...

2010
Jonas Johansson

Reliable electrical power supply is a prerequisite for the modernsociety, and if it fails, it can cause severe consequences in terms of economiclosses and even fatalities. It is thus important to analyse the vulnerabilityof the electric power system. Network analysis has previously been used toanalyse the vulnerability of electric transmission systems. Recent events inSweden...

Journal: :Behaviour research and therapy 2007
Iris M Engelhard Jorg Huijding Marcel A van den Hout Peter J de Jong

The purpose of this prospective study was to examine whether explicit and implicit vulnerability associations before and after trauma exposure predict the onset and persistence of post-traumatic stress disorder (PTSD) symptoms. The implicit association test (IAT) was modified to assess associations of self with vulnerability related cues. Dutch soldiers completed the IAT 6 weeks before being de...

Journal: :Chaos 2007
Stefano Boccaletti Javier Buldú Regino Criado Julio Flores Vito Latora Javier Pello Miguel Romance

We present a novel approach to quantify the vulnerability of a complex network, i.e., the capacity of a graph to maintain its functional performance under random damages or malicious attacks. The proposed measure represents a multiscale evaluation of vulnerability, and makes use of combined powers of the links' betweenness. We show that the proposed approach is able to properly describe some ca...

2011
Willemien van der Weerd Daniëlle RM Timmermans Desirée JMA Beaujean Jurriaan Oudhoff Jim E van Steenbergen

BACKGROUND During the course of an influenza pandemic, governments know relatively little about the possibly changing influence of government trust, risk perception, and receipt of information on the public's intention to adopt protective measures or on the acceptance of vaccination. This study aims to identify and describe possible changes in and factors associated with public's intentions dur...

2007
Damien Miller

This paper examines several security measures that have been implemented in OpenSSH. OpenSSH’s popularity, and the necessity for the server to wield root privileges, have made it a high-value target for attack. Despite initial and ongoing code audits, OpenSSH has suffered from a number of security vulnerabilities over its 7.5 year life. This has prompted the developers to implement several defe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید