Results 31 to 40 of about 489,634 (291)
The delegation of management of aquatic environments and flood prevention to public inter-municipal cooperation establishments to January 1, 2018 resulted in a deep recomposition of the system of actors in charge of the dikes, and a questioning of ...
Tristan Douillard +5 more
doaj +1 more source
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando +4 more
core +1 more source
Threat Modeling—How to Visualize Attacks on IOTA?
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased ...
Ikram Ullah +3 more
doaj +1 more source
TOWARDS GREEN RESILIENT CITIES IN EASTERN EUROPEAN UNION COUNTRIES [PDF]
Investing in green facilities is a process of urban renewal that can transform cities by enhancing the quality of life, strengthening the local economy and reducing environmental impact.
Alexandru BĂNICĂ +2 more
doaj +1 more source
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
Considerable delays often exist between the discovery of a vulnerability and the issue of a patch. One way to mitigate this window of vulnerability is to use a configuration workaround, which prevents the vulnerable code from being executed at the cost ...
D'Angelo, Mariana +3 more
core +1 more source
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices.
Nikolaos Koutroumpouchos +2 more
doaj +1 more source
: Female genital mutilation is one harmful traditional practice that is highly prevalent in African countries such as Guinea, Sierra Leone, the Gambia, Mauritania, Mali, and Burkina Faso, as well as in Sudan, Egypt, and Ethiopia.
Habtamu Wondimu +2 more
doaj +1 more source
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M. +4 more
core +1 more source
The ocean carbon sink – impacts, vulnerabilities and challenges [PDF]
Carbon dioxide (CO2) is, next to water vapour, considered to be the most important natural greenhouse gas on Earth. Rapidly rising atmospheric CO2 concentrations caused by human actions such as fossil fuel burning, land-use change or cement production ...
Anderson, Leif +7 more
core +3 more sources
Early-career researchers feel discouraged from exposing vulnerability even during a global crisis.
openaire +3 more sources

