Results 1 to 10 of about 6,055,547 (381)

Dynamic vulnerability assessment. [PDF]

open access: green, 2004
With increased terrorist threats in the past few years, it is no longer feasible to feel confident that a facility is well protected with a static security system. Potential adversaries often research their targets, examining procedural and system changes, in order to attack at a vulnerable time.
C.M. Nelson
openaire   +5 more sources

Vulnerability chain assessment for multiple vulnerabilities [PDF]

open access: yesProceedings of the 2016 3rd International Conference on Materials Engineering, Manufacturing Technology and Control, 2016
The dangers of a single vulnerability can be assessed by the CVSS, but in some cases, comprehensive harm of several vulnerabilities is 1 + 1> 2. So evaluating multiple vulnerabilities that are not just many single vulnerability assessments, but also integrated many complex situations.
Sujuan Qin, Deqiang Qiu
openaire   +2 more sources

Assessing territorial vulnerability

open access: yesTeMA: Journal of Land Use, Mobility and Environment, 2022
TeMA - Journal of Land Use, Mobility and Environment, Vol 15 No 3 (2022): The city challenges and external agents.
Simone Beltramino   +12 more
openaire   +2 more sources

Climate change vulnerability for species—Assessing the assessments [PDF]

open access: yesGlobal Change Biology, 2016
AbstractClimate change vulnerability assessments are commonly used to identify species at risk from global climate change, but the wide range of methodologies available makes it difficult for end users, such as conservation practitioners or policymakers, to decide which method to use as a basis for decision‐making.
James W. Pearce-Higgins   +7 more
openaire   +5 more sources

Vulnerability Assessment of Dwelling Buildings [PDF]

open access: yes, 2006
Risk is defined as the potential economic, social and environmental consequences of hazardous events that may occur in a specified area unit and period. The evaluation of physical vulnerability and risk of buildings is the main purpose of this chapter. Nevertheless, it is shown the necessity of considering not only the expected physical damage but also
Barbat, Alex   +2 more
openaire   +3 more sources

Vulnerability Assessment of Sensor Systems [PDF]

open access: yesSensors, 2019
There are more and more applications of sensors in today’s world. Moreover, sensor systems are getting more complex and they are used for many high-risk security-critical purposes. Security assurance is a key issue for sensors and for other information technology (IT) products.
openaire   +3 more sources

OpenFlow vulnerability assessment [PDF]

open access: yesProceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013
We provide a brief overview of the vulnerabilities present in the OpenFlow protocol as it is currently deployed by hardware and software vendors. We identify a widespread failure to adopt TLS for the OpenFlow control channel by both controller and switch vendors, leaving OpenFlow vulnerable to man-in-the-middle attacks. We also highlight the classes of
L. Jean Camp, Kevin Benton, Chris Small
openaire   +2 more sources

Vulnerability Assessment of InfiniBand Networking [PDF]

open access: yes, 2019
InfiniBand is an input/output interconnect technology for high performance computing clusters – it is employed in more than one-quarter of the world’s 500 fastest computer systems. Although InfiniBand was created to provide extremely low network latency with high quality of service, the cyber security aspects of InfiniBand have yet to be investigated ...
Schmitt, Daryl   +3 more
openaire   +3 more sources

Groundwater Pollution and Vulnerability Assessment [PDF]

open access: yesWater Environment Research, 2017
Groundwater is a critical resource that serve as a source of drinking water to large human population and, provide long‐term water for irrigation purposes. In recent years; however, this precious resource being increasingly threatened, due to natural and anthropogenic activities. A variety of contaminants of emerging concern such as pharmaceuticals and
openaire   +2 more sources

Vulnerability Assessment as a Service v1

open access: yes, 2020
This deliverable is a report on the progress of the development of the Vulnerability Assessment as a Service (VAaaS) component. VAaaS is one of the central components of SPHINX, which assesses the vulnerability status of network-enabled devices and services, within the SPHINX environment. The assessment outcome is distributed to several internal SPHINX
openaire   +1 more source

Home - About - Disclaimer - Privacy