نتایج جستجو برای: vulnerability matrix

تعداد نتایج: 406702  

Journal: :CoRR 2018
Zhen Li Deqing Zou Shouhuai Xu Xinyu Ou Hai Jin Sujuan Wang Zhijun Deng Yuyi Zhong

The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem rely on human experts to define features and often miss many vulnerabilities (i.e., incurring high false negative rate). In this paper, we initiate the study of using deep learning-based vulnerability detection to relieve human experts from the tedious and subjective...

2000
David P. Gilliam John C. Kelly Matt Bishop

This paper discusses new joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis sponsored by the National Aeronautics and Space Administration to develop a security assessment instrument for the sojiware development and maintenance life cycle. The assessment instrument is a collection of tools and procedures to support developm...

Journal: :international journal of mathematical modelling and computations 0
a. sadeghi department of mathematics, islamic azad university, robat karim branch, tehran, iran.

the matrix functions appear in several applications in engineering and sciences. the computation of these functions almost involved complicated theory. thus, improving the concept theoretically seems unavoidable to obtain some new relations and algorithms for evaluating these functions. the aim of this paper is proposing some new reciprocal for the function of block anti diagonal matrices. more...

Journal: :آمایش سرزمین 0
سعید امان پور دانشیار، دانشکدة علوم زمین، دانشگاه شهید چمران اهواز، اهواز، ایران مصطفی محمدی ده چشمه استادیار، دانشکدة علوم زمین، دانشگاه شهید چمران اهواز، اهواز، ایران مهدی علیزاده دانشجوی کارشناسی ارشد، دانشکدة علوم زمین، دانشگاه شهید چمران اهواز، اهواز، ایران

the occurrence of natural and human disasters can create heavy casualties in cities and urban areas and such a critical issue makes it inevitable to pay a great deal of attention to the vulnerability and safety aspects of cities and the accessibility to the urban welfare standards from the perspective of passive defense. the geostrategic location of koohdasht city in iran and its vulnerability ...

2012
Fabrizio Montecucco Vincent Braunersreuther Giorgio Luciano Viviani Sébastien Lenglet François Mach

Acute atherosclerotic complications, such as myocardial infarction, are often provoked by the rupture of an atherosclerotic plaque and the subsequent thrombotic occlusion of the arterial lumen, which interrupts the blood flow and renders ischemic the downstream peripheral tissue. Several inflammatory mediators (including cytokines, chemokines and matrix metalloproteases) have been shown to orch...

2015
Xiaming Ye Junhua Zhao Yan Zhang Fushuan Wen Thorsten Staake

The distribution automation system (DAS) is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the as...

Journal: :فیزیک زمین و فضا 0
saman javadi department of water engineering, college of abouraihan, university of tehran, s. mehdy hashemy department of water engineering, college of abouraihan, university of tehran, tehran, iran

due to simple operation and no needs for expensive infrastructure construction to convey water from a source to farm lands, groundwater becomes the most important sources of agricultural water supply in iran. however, the contamination of aquifers is a major concern in many countries, specifically in areas without effective groundwater protection and management. therefore, groundwater vulnerabi...

Journal: :پژوهش و برنامه ریزی روستایی 0
مرتضی نعمتی محمود عبیات حسن دانشیان

1-introduction one of the problems that is important in the waste management is the topic of waste rural landfill site selection and latex resulting from that in rural areas. the latex can be because groundwater pollution the contamination vulnerability and groundwater protection assessment has proved to be an effective tool for the delineation of protection zones in area affected by groundwate...

2006
Dale Peterson

All too often we hear stories about the IT Department or some consultant running a vulnerability scan that takes down a key control systems server or component with potentially devastating effects on the underlying process. This is usually followed by the statement that SCADA and other control systems should never be scanned. In fact, many experts and training courses recommend that control sys...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید