Results 211 to 220 of about 345,903 (245)
Some of the next articles are maybe not open access.

Vulnerable: A Concept Analysis

Nursing Forum, 2004
In spite of the significance of vulnerable as a phenomenon that affects the human condition, its essence remains complex and elusive.A conceptual analysis to clarify knowledge of this concept to explore the common and scientific usage.A comprehensive and systematic review from bibliographic and abstract databases and online searches.Findings ...
openaire   +2 more sources

Global Vulnerability Analysis

2018
Climate can have great influence on our lives as shown by the great damage and loss of life in events such as Hurricane Mitch in Central America, the 1999 cyclone in Orissa, India and the flooding in Mozambique in 2000. Such events could be intensified by climate change, making this issue a major challenge for the 21st Century.
Nicholls, R.J., Hoozemans, F.M.J.
openaire   +1 more source

Vulnerability Analysis of Optimized Structures

AIAA Journal, 1977
An iterative method for the analysis of damaged structures is presented in the context of the displacement method of finite-elemen t analysis, the damage is defined as the loss of stiffness of the structure. The method consists of first finding the solution of the undamaged structure and then determining the perturbed solution due to the damage by ...
Venkayya, V. B.   +2 more
openaire   +1 more source

Analysis of Firmware Vulnerabilities

2021
This chapter will introduce typical security penetration schemes in IoT firmware. Generally, the steps of security penetration include: obtaining firmware, modifying firmware, program analysis, vulnerability mining, and vulnerability exploitation. The researcher’s experience in each step will help readers avoid obstacles, and this chapter introduces ...
Qinghao Tang, Fan Du
openaire   +1 more source

Household Financial Vulnerability: An Empirical Analysis

SSRN Electronic Journal, 2011
Abstract Using survey data, we investigate household financial distress. Specifically, we propose an indicator of financial vulnerability to jointly analyse different features of household financial distress, analysing its socio-demographic and economic determinants. A total number of 3102 Italian households make up the sample.
L. Anderloni, E. Bacchiocchi, D. Vandone
openaire   +3 more sources

Supporting automated vulnerability analysis using formalized vulnerability signatures

Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, 2012
Adopting publicly accessible platforms such as cloud computing model to host IT systems has become a leading trend. Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on applications' security. Hackers can easily exploit vulnerabilities in such publically accessible services.
Abdelrazek, Mohamed   +2 more
openaire   +1 more source

Docker ecosystem – Vulnerability Analysis

Computer Communications, 2018
Abstract Cloud based infrastructures have typically leveraged virtualization. However, the need for always shorter development cycles, continuous delivery and cost savings in infrastructures, led to the rise of containers. Indeed, containers provide faster deployment than virtual machines and near-native performance.
A. Martin   +3 more
openaire   +1 more source

Design Vulnerability Analysis

2013
Due to globalization, designs are vulnerable to Trojan insertion at any stage of their development. Third-party intellectual properties (IPs) are pervasive throughout high-level implementation. Their details are not delivered most of the time; therefore, IPs may stealthily deviate from the designers’ determined specifications.
Mohammad Tehranipoor   +2 more
openaire   +1 more source

Union Vulnerability Analysis

Management Report for Nonunion Organizations, 2018
National Labor Relations Board statistics and union surveys demonstrate that unions are most successful when organizing small bargaining units. As part of its vulnerability analysis, an employer should examine its structure to determine whether it is vulnerable to a potential union's effort to organize a part of its workforce.
openaire   +1 more source

Forest Fire Vulnerability Analysis

2009
After a strong wind disturbance in the High Tatras Mountains National Park in November 2004, the problem of forest fire prevention has attracted much attention from our society. Under our conditions, forest fire is an undesirable phenomenon, damaging not only the forest ecosystem but also, if the fire spreads behind the forest borders, endangering the ...
J. Tuček, A. Majlingová
openaire   +1 more source

Home - About - Disclaimer - Privacy