نتایج جستجو برای: vulnerability

تعداد نتایج: 42681  

2016
Alexander Pretschner

Context Using components with known vulnerabilities is still one of the most frequent causes for security incidents today [5]. It is of the essence, therefore, to possess a comprehensive overview of the software components utilized by the software, in order to mitigate the vulnerabilities they may withold prior to releasing the software. On the one hand, tools like Maven provide a reliable over...

Journal: :اکو هیدرولوژی 0
مریم قره خانی دانشجوی کارشناسی ارشد هیدروژئولوژی، دانشکدۀ علوم طبیعی، دانشگاه تبریز عطا الله ندیری استادیار گروه علوم زمین، دانشکدۀ علوم طبیعی، دانشگاه تبریز اصغر اصغری مقدم استاد گروه علوم زمین، دانشکدۀ علوم طبیعی، دانشگاه تبریز فریبا صادقی اقدم دانشجوی دکتری هیدروژئولوژی، دانشکدۀ علوم طبیعی، دانشگاه تبریز

with respect to population growth and agricultural development in ardabil plain, vulnerability assessment of the plain aquifer is necessary for management of groundwater resources and the prevention of groundwater contamination. in this study, vulnerability of ardabil plain aquifer to pollution was evaluated by drastic method. drastic model was prepared by seven effective parameters on vulnerab...

Journal: :تحقیقات نظام سلامت 0
مریم سلیمی کارشناس ارشد، گروه مهندسی بهداشت محیط، دانشکده بهداشت، دانشگاه علوم پزشکی اصفهان، اصفهان، ایران. افشین ابراهیمی استادیار،‎ ‎مرکز‎ ‎تحقیقات‎ ‎محیط‎ ‎زیست،‎ ‎دانشگاه‎ ‎علوم‎ ‎پزشکی‎ ‎اصفهان،‎ ‎اصفهان،‎ ‎ایران افسانه سلیمی دانشجوی کارشناسی ارشد جغرافیای طبیعی(گرایش اقلیم شناسی)، دانشگاه تربیت معلم سبزوار، دانشکده جغرافیا و علوم محیطی، سبزوار، ایران

abstract background: leachate produced by waste disposal sites can be contaminating groundwater. the contamination vulnerability and groundwater protection assessment has proved to be an effective tool for the delineation of protection zones in area affected by groundwater contamination. the main objective of the study is to evaluate aquifer pollution vulnerability in the new waste disposal sit...

رنجبری, توحید, محمدی, ابوالفضل, نوروزی, محمدرضا, کریمی, جواد,

Objectives The triple vulnerability model includes three types of vulnerability in terms of emotional disorders: general biological vulnerability, general psychological vulnerability, and disorder-specific psychological vulnerability. Since previous studies have mostly addressed only one of these components, this study was conducted to examine all the three components of the triple vulnerabilit...

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, faculty of engineering science

the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in di erent forms to study many of the measures of vulnerability. when certain ver...

2008
Mark McGillivray Wim Naudé

A small but growing literature has been concerned about the economic (and environmental) vulnerability on the level of countries. Less attention is paid to the economic vulnerability of different regions within countries. By focusing on the vulnerability of subnational regions, our paper contributes to the small literature on the ‘vulnerability of place’. We see the vulnerability of place as be...

2016
Frank Li Zakir Durumeric Jakub Czyz Mohammad Karami Michael Bailey Damon McCoy Stefan Savage Vern Paxson

Security researchers can send vulnerability notifications to take proactive measures in securing systems at scale. However, the factors affecting a notification’s efficacy have not been deeply explored. In this paper, we report on an extensive study of notifying thousands of parties of security issues present within their networks, with an aim of illuminating which fundamental aspects of notifi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید