نتایج جستجو برای: vulnerability matrix
تعداد نتایج: 406702 فیلتر نتایج به سال:
The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem rely on human experts to define features and often miss many vulnerabilities (i.e., incurring high false negative rate). In this paper, we initiate the study of using deep learning-based vulnerability detection to relieve human experts from the tedious and subjective...
This paper discusses new joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis sponsored by the National Aeronautics and Space Administration to develop a security assessment instrument for the sojiware development and maintenance life cycle. The assessment instrument is a collection of tools and procedures to support developm...
the matrix functions appear in several applications in engineering and sciences. the computation of these functions almost involved complicated theory. thus, improving the concept theoretically seems unavoidable to obtain some new relations and algorithms for evaluating these functions. the aim of this paper is proposing some new reciprocal for the function of block anti diagonal matrices. more...
the occurrence of natural and human disasters can create heavy casualties in cities and urban areas and such a critical issue makes it inevitable to pay a great deal of attention to the vulnerability and safety aspects of cities and the accessibility to the urban welfare standards from the perspective of passive defense. the geostrategic location of koohdasht city in iran and its vulnerability ...
Acute atherosclerotic complications, such as myocardial infarction, are often provoked by the rupture of an atherosclerotic plaque and the subsequent thrombotic occlusion of the arterial lumen, which interrupts the blood flow and renders ischemic the downstream peripheral tissue. Several inflammatory mediators (including cytokines, chemokines and matrix metalloproteases) have been shown to orch...
The distribution automation system (DAS) is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the as...
due to simple operation and no needs for expensive infrastructure construction to convey water from a source to farm lands, groundwater becomes the most important sources of agricultural water supply in iran. however, the contamination of aquifers is a major concern in many countries, specifically in areas without effective groundwater protection and management. therefore, groundwater vulnerabi...
1-introduction one of the problems that is important in the waste management is the topic of waste rural landfill site selection and latex resulting from that in rural areas. the latex can be because groundwater pollution the contamination vulnerability and groundwater protection assessment has proved to be an effective tool for the delineation of protection zones in area affected by groundwate...
All too often we hear stories about the IT Department or some consultant running a vulnerability scan that takes down a key control systems server or component with potentially devastating effects on the underlying process. This is usually followed by the statement that SCADA and other control systems should never be scanned. In fact, many experts and training courses recommend that control sys...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید