Results 31 to 40 of about 489,634 (291)

Les digues littorales à l’heure de la GEMAPI : une opportunité de gestion intégrée face au risque de submersion ? Le cas de l’estuaire de la Dives et de la Baie des Veys

open access: yesBulletin de l’Association de Géographes Français, 2022
The delegation of management of aquatic environments and flood prevention to public inter-municipal cooperation establishments to January 1, 2018 resulted in a deep recomposition of the system of actors in charge of the dikes, and a questioning of ...
Tristan Douillard   +5 more
doaj   +1 more source

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

Threat Modeling—How to Visualize Attacks on IOTA?

open access: yesSensors, 2021
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased ...
Ikram Ullah   +3 more
doaj   +1 more source

TOWARDS GREEN RESILIENT CITIES IN EASTERN EUROPEAN UNION COUNTRIES [PDF]

open access: yesJournal of Urban and Regional Analysis, 2020
Investing in green facilities is a process of urban renewal that can transform cities by enhancing the quality of life, strengthening the local economy and reducing environmental impact.
Alexandru BĂNICĂ   +2 more
doaj   +1 more source

Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response

open access: yes, 2017
Considerable delays often exist between the discovery of a vulnerability and the issue of a patch. One way to mitigate this window of vulnerability is to use a configuration workaround, which prevents the vulnerable code from being executed at the cost ...
D'Angelo, Mariana   +3 more
core   +1 more source

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

open access: yesSensors, 2021
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices.
Nikolaos Koutroumpouchos   +2 more
doaj   +1 more source

A qualitative study on the unresolved problem of female genital mutilations, socio-cultural reasons, and policy issues in the Afar regions of Ethiopia

open access: yesCogent Public Health, 2023
: Female genital mutilation is one harmful traditional practice that is highly prevalent in African countries such as Guinea, Sierra Leone, the Gambia, Mauritania, Mali, and Burkina Faso, as well as in Sudan, Egypt, and Ethiopia.
Habtamu Wondimu   +2 more
doaj   +1 more source

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

open access: yes, 2017
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M.   +4 more
core   +1 more source

The ocean carbon sink – impacts, vulnerabilities and challenges [PDF]

open access: yes, 2014
Carbon dioxide (CO2) is, next to water vapour, considered to be the most important natural greenhouse gas on Earth. Rapidly rising atmospheric CO2 concentrations caused by human actions such as fossil fuel burning, land-use change or cement production ...
Anderson, Leif   +7 more
core   +3 more sources

Being vulnerable [PDF]

open access: yeseLife, 2020
Early-career researchers feel discouraged from exposing vulnerability even during a global crisis.
openaire   +3 more sources

Home - About - Disclaimer - Privacy