نتایج جستجو برای: vulnerability assessment

تعداد نتایج: 598326  

1997
R. G. Johnston LAUR Roger G. Johnston

Tamper-indicating devices, also called security seals, are widely used to detect tampering or unauthorized entry. We studied 94 different security seals, both passive and electronic, developed either commercially or by the United States Government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low...

2013
Srujan Kotikela Krishna Kavi Mahadevan Gomathisankaran

As vulnerabilities keep increasing exponentially every year, the need to efficiently classify, manage, and analyse them also increases. Many of the previous attempts at managing vulnerabilities have not been so successful because of the use of taxonomy approach. Few of the recent approaches have used ontologies for vulnerability management. Ontologies are real world concepts that are modelled u...

2012
SACHIN UMRAO MANDEEP KAUR GOVIND KUMAR GUPTA

In this modern world, all of the persons are using the facility of internet. SECURITY is one of the major issue of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested named Vulnerability Assessment and Penetration Testing (VAPT). Vulnerability Assessment i...

2013
K. Tadjer M. Bensaibi

The seismic vulnerability of an urban area is of a great deal for local authorities especially those facing earthquakes. So, it is important to have an efficient tool to assess the vulnerability of existing buildings. The use of the VIP (Vulnerability Index Program) and the GIS (Geographic Information System) let us to identify the most vulnerable districts of an urban area. The use of the vuln...

M. Safarkhanlou Mehran Seyed Razzaghi,

 Many existing bridges were designed without adequate consideration of seismic risk. The full or partial collapse of even one major bridge in a city or community would have destroying results. There has been focuses on developing fragility-based seismic vulnerability of existing usual bridges in Iran or support decision making on seismic upgrade. This article focuses on developing performance b...

Journal: :journal of health sciences and surveillance system 0
mohammad ali baghapour department of environmental health engineering, school of health and nutrition, shiraz university of medical sciences, shiraz, iran nasser talebbeydokhti department of civil engineering, college of engineering, shiraz university, shiraz, ir iran hamidreza tabatabee department of epidemiology, school of health, shiraz university of medical sciences, shiraz, ir iran amir fadaei nobandegani department of environmental health engineering, school of health, shiraz university of medical sciences, shiraz, ir iran

background: groundwater nitrate pollution is an important environmental problem in water resources management. in this regard, specific measures aiming at prevention of water pollution will be helpful to managers and decision-makers. identification of aquifers’ vulnerable areas and determination of groundwater protection zones using most widely used models, such as drastic and cd, are one of th...

Journal: :Advances in Civil Engineering 2018

Journal: :Water 2022

Water scarcity and pollution have arisen as global issues in the twenty-first century [...]

Journal: :Journal of hazardous materials 2003
Calvin D Jaeger

Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was to develop, test and validate a vulnerability assessment methodology (VAM) for determining the security of chemical facilities against terrorist or criminal att...

2011
Jairo Serrano Elisa Heymann Eduardo Cesar Barton Miller

Security on Grid computing is often an afterthought. However assessing security of middleware systems is of the utmost importance because they manage critical resources owned by different organizations. To fulfill this objective we use First Principles Vulnerability Assessment (FPVA), an innovative analystic-centric (manual) methodology that goes beyond current automated vulnerability tools. FP...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید