نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Journal: :JSW 2012
Guoxiang Yao Quanlong Guan Kaibin Ni

The number of Web controls’ security vulnerability surged with ever-changing varieties of attacks. Therefore this paper analyzes test model for Web controls’ vulnerability, and put forward a improved test model for Web controls’ vulnerability. Be aimed to test vulnerability of Web ActiveX controls combining static analysis and dynamic analysis, as well as put forward a proposal of optimizing th...

Introduction: Mining is one of the most effective human activities to change the situation in the region, particularly in arid area. The human demand for minerals and energy resources under the ground has made mining and exploration operations inevitable. Mining is one of the common human behaviors with numerous outcomes for the ecosystem along with serious environmental and ecological conseque...

ژورنال: علوم آب و خاک 2018

To determine the potential for groundwater contamination, vulnerability should be evaluated in different areas susceptible to contamination should be investigated. Aquifer (carbonate) karst or part of it is karst aquifer in the western region of Iran; due to the natural conditions of the region and human activities, they are susceptible to contamination by carbonate aquifer through holes devour...

2015
Changhua Zhu Changxing Pei

Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile co...

2009
Patricia Romero Lankao John L. Tribbia

Can repeated patterns of vulnerability and resilience be identified across urban areas? This question is addressed using a conceptualization of vulnerability developed by the climate community and applying a model-centered meta-analysis approach of 64 case studies on cities and vulnerability. In this meta-analysis the authors pull a minimum set of models or frameworks to go beyond existing case...

رنجبری, توحید, محمدی, ابوالفضل, نوروزی, محمدرضا, کریمی, جواد,

Objectives The triple vulnerability model includes three types of vulnerability in terms of emotional disorders: general biological vulnerability, general psychological vulnerability, and disorder-specific psychological vulnerability. Since previous studies have mostly addressed only one of these components, this study was conducted to examine all the three components of the triple vulnerabilit...

Journal: :تحقیقات مهندسی کشاورزی 0
صالح ارشد دانشجوی دکتری سعید مرید دانشیار دانشگاه تربیت مدرس محمدرضا مباشری استادیار دانشکده نقشه برداری دانشگاه صنعتی خواجه نصیرالدین طوسی مجید آقا علیخانی استادیار دانشگاه تربیت مدرس

the agriculture sector has been affected by severe drought in recent years, making development of a drought warning system for agriculture crucial. such a system can be a useful tool for policy makers and investors. this research develops a model for agricultural drought risk assessment using statistical and intelligent methods. kermanshah province, a major rain-fed region of iran, was selected...

Journal: :INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH 2020

2010
Felix Wu Sean Peisert

Repeatability is essential to any science—computer science is no exception. However, the area of vulnerability analysis suffers from ambiguous definitions that hinder the repeatability of analysis results. Many researchers have turned to policy-based definitions of a vulnerability in an attempt to alleviate this ambiguity. However, it is rare that security policies are explicitly and precisely ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید