Results 31 to 40 of about 306,057 (287)
A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management
Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools.
Pietro Russo +3 more
doaj +1 more source
Protecting Vulnerable Road Users from Injury
Aymery Constant and Emmanuel Lagarde discuss policies to protect pedestrians, and pedal and motor cyclists, from injury.
Constant, Aymery, Lagarde, Emmanuel
openaire +5 more sources
A user exposure based approach for non-structural road network vulnerability analysis.
Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework.
Lei Jin +4 more
doaj +1 more source
Denitrification in Intrinsic and Specific Groundwater Vulnerability Assessment: A Review
Several groundwater vulnerability methodologies have been implemented throughout the years to face the increasing worldwide groundwater pollution, ranging from simple rating methodologies to complex numerical, statistical, and hybrid methods.
Gianluigi Busico +2 more
doaj +1 more source
DeepSQLi: Deep Semantic Learning for Testing SQL Injection
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi +15 more
core +1 more source
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
Method for assessing the risk of user compromise based on individual security profile
This article presents a method for assessing the risk of user compromise in corporate information systems caused by social engineering cyberattacks.
Svitlana Lehominova +4 more
doaj +1 more source
Vulnerable users: deceptive robotics
The Principles of Robotics were outlined by the EPSRC in 2010. They are aimed at regulating robots in the real world. This paper represents a response to principle number four which reads: “Robots are manufactured artefacts. They should not be designed in a deceptive way to exploit vulnerable users; instead their machine nature should be transparent ...
openaire +3 more sources
User guide : Groundwater Vulnerability (Scotland) GIS dataset. Version 2 [PDF]
This report describes a revised version (Version 2) of the groundwater vulnerability (Scotland) digital dataset produced by the British Geological Survey (BGS).
Doce, D.D. +3 more
core
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source

