Results 211 to 220 of about 345,903 (245)
Some of the next articles are maybe not open access.
Vulnerable: A Concept Analysis
Nursing Forum, 2004In spite of the significance of vulnerable as a phenomenon that affects the human condition, its essence remains complex and elusive.A conceptual analysis to clarify knowledge of this concept to explore the common and scientific usage.A comprehensive and systematic review from bibliographic and abstract databases and online searches.Findings ...
openaire +2 more sources
2018
Climate can have great influence on our lives as shown by the great damage and loss of life in events such as Hurricane Mitch in Central America, the 1999 cyclone in Orissa, India and the flooding in Mozambique in 2000. Such events could be intensified by climate change, making this issue a major challenge for the 21st Century.
Nicholls, R.J., Hoozemans, F.M.J.
openaire +1 more source
Climate can have great influence on our lives as shown by the great damage and loss of life in events such as Hurricane Mitch in Central America, the 1999 cyclone in Orissa, India and the flooding in Mozambique in 2000. Such events could be intensified by climate change, making this issue a major challenge for the 21st Century.
Nicholls, R.J., Hoozemans, F.M.J.
openaire +1 more source
Vulnerability Analysis of Optimized Structures
AIAA Journal, 1977An iterative method for the analysis of damaged structures is presented in the context of the displacement method of finite-elemen t analysis, the damage is defined as the loss of stiffness of the structure. The method consists of first finding the solution of the undamaged structure and then determining the perturbed solution due to the damage by ...
Venkayya, V. B. +2 more
openaire +1 more source
Analysis of Firmware Vulnerabilities
2021This chapter will introduce typical security penetration schemes in IoT firmware. Generally, the steps of security penetration include: obtaining firmware, modifying firmware, program analysis, vulnerability mining, and vulnerability exploitation. The researcher’s experience in each step will help readers avoid obstacles, and this chapter introduces ...
Qinghao Tang, Fan Du
openaire +1 more source
Household Financial Vulnerability: An Empirical Analysis
SSRN Electronic Journal, 2011Abstract Using survey data, we investigate household financial distress. Specifically, we propose an indicator of financial vulnerability to jointly analyse different features of household financial distress, analysing its socio-demographic and economic determinants. A total number of 3102 Italian households make up the sample.
L. Anderloni, E. Bacchiocchi, D. Vandone
openaire +3 more sources
Supporting automated vulnerability analysis using formalized vulnerability signatures
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, 2012Adopting publicly accessible platforms such as cloud computing model to host IT systems has become a leading trend. Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on applications' security. Hackers can easily exploit vulnerabilities in such publically accessible services.
Abdelrazek, Mohamed +2 more
openaire +1 more source
Docker ecosystem – Vulnerability Analysis
Computer Communications, 2018Abstract Cloud based infrastructures have typically leveraged virtualization. However, the need for always shorter development cycles, continuous delivery and cost savings in infrastructures, led to the rise of containers. Indeed, containers provide faster deployment than virtual machines and near-native performance.
A. Martin +3 more
openaire +1 more source
2013
Due to globalization, designs are vulnerable to Trojan insertion at any stage of their development. Third-party intellectual properties (IPs) are pervasive throughout high-level implementation. Their details are not delivered most of the time; therefore, IPs may stealthily deviate from the designers’ determined specifications.
Mohammad Tehranipoor +2 more
openaire +1 more source
Due to globalization, designs are vulnerable to Trojan insertion at any stage of their development. Third-party intellectual properties (IPs) are pervasive throughout high-level implementation. Their details are not delivered most of the time; therefore, IPs may stealthily deviate from the designers’ determined specifications.
Mohammad Tehranipoor +2 more
openaire +1 more source
Management Report for Nonunion Organizations, 2018
National Labor Relations Board statistics and union surveys demonstrate that unions are most successful when organizing small bargaining units. As part of its vulnerability analysis, an employer should examine its structure to determine whether it is vulnerable to a potential union's effort to organize a part of its workforce.
openaire +1 more source
National Labor Relations Board statistics and union surveys demonstrate that unions are most successful when organizing small bargaining units. As part of its vulnerability analysis, an employer should examine its structure to determine whether it is vulnerable to a potential union's effort to organize a part of its workforce.
openaire +1 more source
Forest Fire Vulnerability Analysis
2009After a strong wind disturbance in the High Tatras Mountains National Park in November 2004, the problem of forest fire prevention has attracted much attention from our society. Under our conditions, forest fire is an undesirable phenomenon, damaging not only the forest ecosystem but also, if the fire spreads behind the forest borders, endangering the ...
J. Tuček, A. Majlingová
openaire +1 more source

