نتایج جستجو برای: Vulnerability mitigation

تعداد نتایج: 74066  

2011
Anshu Tripathi Umesh Kumar Singh Zhongqiang Chen Yuan Zhang Zhongrong Chen Chris Johnson

Rising vulnerability statistics demands multidimensional trend analysis for efficient threat mitigation. Understanding trends aids in early detection of problems and also in planning defense mechanisms. In this regard, this paper presents finegrained trend analysis on classified vulnerability data provided by NVD, across six CVSS base metrics. Such analysis of vulnerability data according to th...

2001
Olga V. Wilhelmi Donald A. Wilhite

Recent drought events in the United States and the magnitude of drought losses indicate the continuing vulnerability of the country to drought. Until recently, drought management in many states, including Nebraska, has been largely response oriented with little or no attention to mitigation and preparedness. In 1998, Nebraska began to revise its drought plan in order to place more emphasis on m...

Journal: :I. J. Network Security 2006
Adam J. Rocke Ronald F. DeMara

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tampering-point introduces vulnerabilities, especially from knowledgeable insiders capable of...

2011
Detlef P. van Vuuren Keywan Riahi Richard Moss Jae Edmonds Allison Thomson Nebojsa Nakicenovic Tom Kram Frans Berkhout Rob Swart Anthony Janetos Steven K. Rose Nigel Arnell

In this paper, we propose a scenario framework that could provide a scenario ‘‘thread’’ through the different climate research communities (climate change – vulnerability, impact, and adaptation and mitigation) in order to support assessment of mitigation and adaptation strategies and climate impacts. The scenario framework is organized around a matrix with two main axes: radiative forcing leve...

2010
Hossain Shahriar

Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...

2015
Liu Hong Min Ouyang Srinivas Peeta Xiaozheng He Yongze Yan

The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies ...

2017
László Erdödi Audun Jøsang

Exploits are advanced threats that take advantage of vulnerabilities in IT infrastructures. The technological background of the exploits has been changed during the years. Several significant protections have been introduced (e.g. Data Execution Prevention, Enhanced Mitigation Experience Toolkit, etc.), but attackers have always found effective ways to bypass any protection. This study gives a ...

Journal: :Rel. Eng. & Sys. Safety 2015
Liu Hong Min Ouyang Srinivas Peeta Xiaozheng He Yongze Yan

The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies ...

2010
Eric Tate Susan L Cutter Melissa Berry

A primary goal of the US Disaster Mitigation Act of 2000 is to slow the increase in disaster losses by emphasizing a proactive approach focusing on predisaster hazard mitigation, rather than postdisaster relief. The legislation requires local communities to produce hazard-mitigation plans that include multihazard maps, signifying a de facto prioritization of mitigation dollars on the basis of a...

Journal: :CoRR 2017
Michael Backes Jörg Hoffmann Robert Künnemann Patrick Speicher Marcel Steinmetz

Penetration testing is a well-established practical concept for the identification of potentially exploitable security weaknesses and an important component of a security audit. Providing a holistic security assessment for networks consisting of several hundreds hosts is hardly feasible though without some sort of mechanization. Mitigation, prioritizing countermeasures subject to a given budget...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید