Results 341 to 350 of about 6,055,547 (381)
Some of the next articles are maybe not open access.

VULNERABILITY ASSESSMENT IN LANDSLIDE RISK ANALYSIS

, 2020
Community service activities has been carried out in the Pudak Payung area of Semarang city. The research aim was constructing a map of the vulnerability zone that can provide information on areas prone to landslides.
U. Harmoko, Gatot Yuliyanto, T. Yulianto
semanticscholar   +1 more source

Security Simulation for Vulnerability Assessment

IEEE Aerospace and Electronic Systems Magazine, 2006
This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, Concept Of Operations (CONOPS) development and operator ...
Norman, Wesson, Hennessey
openaire   +4 more sources

Ecological vulnerability assessment and spatial pattern optimization of resource-based cities: A case study of Huaibei City, China

Human and Ecological Risk Assessment, 2020
The continuous, intense exploitation of resources under rapid industrialization has made the ecological environment of resource-based cities increasingly vulnerability.
Haifeng Yang, G. Zhai, Yan Zhang
semanticscholar   +1 more source

Assessing the Vulnerability of Buildings

Journal of Applied Fire Science, 2005
PurposeThe purpose of this paper is to set forth a rigorous methodology for building owners and managers to conduct a vulnerability assessment of their facilities. Such a process would facilitate the use of remediation measures to limit the loss of life and property during a disaster, whether natural or man‐made.Design/methodology/approachThe author ...
openaire   +3 more sources

SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing

International Conference on Internet of Things: Systems, Management and Security, 2019
Blockchain has flourished in recent years. As a decentralized system architecture, smart contracts give the blockchain a user-defined logical concept. The smart contract is an executable program that can be used for automatic transactions on the Ethereum
Jian-Wei Liao   +3 more
semanticscholar   +1 more source

Assessment of Hypervisor Vulnerabilities

2016 International Conference on Cloud Computing Research and Innovations (ICCCRI), 2016
Hypervisors are the main components for managing virtual machines on cloud computing systems. Thus, the security of hypervisors is very crucial as the whole system could be compromised when just one vulnerability is exploited. In this paper, we assess the vulnerabilities of widely used hypervisors including VMware ESXi, Citrix XenServer and KVM using ...
Sudsanguan Ngamsuriyaroj   +1 more
openaire   +2 more sources

Vulnerability Assessment

2006
Publisher Summary This chapter presents the actual scanning of systems for vulnerabilities and discusses the reasons behind the necessity of performing such a scan. There are essentially three different reasons behind a vulnerability assessment: (1) to verify that the systems are not vulnerable or identify systems that are vulnerable; (2) to either ...
Chris Gatford   +2 more
openaire   +2 more sources

Beyond the Vulnerability Assessment

Opflow, 2004
This article addresses some of the issues and constraints that must be considered when upgrading a facility and its assets to reduce the risk of malevolent attacks. Topics covered include: a historical look at security; security solutions; risk reduction, mitigation, and costs; and, confidentiality and procurement considerations.
Doug Herbst, Ron Booth, Robert Ainslie
openaire   +2 more sources

Vulnerability assessments

2007
Publisher Summary Vulnerabilities are weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerabilities include structural, procedural, electronic, human, and other elements that provide opportunities to attack assets. They can be categorized as physical, technical, or operational.
openaire   +2 more sources

Assessing Social Vulnerability

2014
A critical piece, and often the most neglected piece, of resilience to disaster is the identification and mapping of a community’s social vulnerabilities. When disaster strikes, its impact is not just a function of its magnitude and where it strikes.
Lori Feild Schwarz   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy