Results 201 to 210 of about 345,903 (245)

The Vulnerability of Chinese Theaceae Species Under Future Climate Change. [PDF]

open access: yesBiology (Basel)
Zhao X   +9 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

FlowVisor vulnerability analysis

2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
This paper explored possible vulnerabilities in FlowVisor, SDN virtualized tool, and analyzed the potential isolation issue between multiple virtual slices by FlowVisor. We discovered a security vulnerability of interference between virtual slices in SDN, which leaves holes for potential malicious attacks.
Ying Qian, Wanqing You, Kai Qian
openaire   +1 more source

Network vulnerability analysis

The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002., 2003
The increasing volume of attacks on the Internet has increased the demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security.
B. Skaggs   +3 more
openaire   +1 more source

Social Vulnerability: A Multidimensional Analysis

2010
Social vulnerability can be defined as a life-situation characterized by a multi-dimensional combination of factors of disadvantage and advantage, of inclusion and exclusion. Its distinctive feature is that weak and unstable integration in the main mechanisms of resource distribution in contemporary society places people in a situation of uncertainty ...
RANCI ORTIGOSA, COSTANZO, M. Migliavacca
openaire   +3 more sources

Home - About - Disclaimer - Privacy