Results 31 to 40 of about 306,057 (287)

A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management

open access: yesInformation, 2019
Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools.
Pietro Russo   +3 more
doaj   +1 more source

Protecting Vulnerable Road Users from Injury

open access: yesPLoS Medicine, 2010
Aymery Constant and Emmanuel Lagarde discuss policies to protect pedestrians, and pedal and motor cyclists, from injury.
Constant, Aymery, Lagarde, Emmanuel
openaire   +5 more sources

A user exposure based approach for non-structural road network vulnerability analysis.

open access: yesPLoS ONE, 2017
Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework.
Lei Jin   +4 more
doaj   +1 more source

Denitrification in Intrinsic and Specific Groundwater Vulnerability Assessment: A Review

open access: yesApplied Sciences, 2021
Several groundwater vulnerability methodologies have been implemented throughout the years to face the increasing worldwide groundwater pollution, ranging from simple rating methodologies to complex numerical, statistical, and hybrid methods.
Gianluigi Busico   +2 more
doaj   +1 more source

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

open access: yes, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Method for assessing the risk of user compromise based on individual security profile

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
This article presents a method for assessing the risk of user compromise in corporate information systems caused by social engineering cyberattacks.
Svitlana Lehominova   +4 more
doaj   +1 more source

Vulnerable users: deceptive robotics

open access: yesConnection Science, 2017
The Principles of Robotics were outlined by the EPSRC in 2010. They are aimed at regulating robots in the real world. This paper represents a response to principle number four which reads: “Robots are manufactured artefacts. They should not be designed in a deceptive way to exploit vulnerable users; instead their machine nature should be transparent ...
openaire   +3 more sources

User guide : Groundwater Vulnerability (Scotland) GIS dataset. Version 2 [PDF]

open access: yes, 2011
This report describes a revised version (Version 2) of the groundwater vulnerability (Scotland) digital dataset produced by the British Geological Survey (BGS).
Doce, D.D.   +3 more
core  

Parent Quality of Life at Two Years Following Their Child's Completion of Acute Lymphoblastic Leukemia Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy