Results 341 to 350 of about 6,055,547 (381)
Some of the next articles are maybe not open access.
VULNERABILITY ASSESSMENT IN LANDSLIDE RISK ANALYSIS
, 2020Community service activities has been carried out in the Pudak Payung area of Semarang city. The research aim was constructing a map of the vulnerability zone that can provide information on areas prone to landslides.
U. Harmoko, Gatot Yuliyanto, T. Yulianto
semanticscholar +1 more source
Security Simulation for Vulnerability Assessment
IEEE Aerospace and Electronic Systems Magazine, 2006This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, Concept Of Operations (CONOPS) development and operator ...
Norman, Wesson, Hennessey
openaire +4 more sources
Human and Ecological Risk Assessment, 2020
The continuous, intense exploitation of resources under rapid industrialization has made the ecological environment of resource-based cities increasingly vulnerability.
Haifeng Yang, G. Zhai, Yan Zhang
semanticscholar +1 more source
The continuous, intense exploitation of resources under rapid industrialization has made the ecological environment of resource-based cities increasingly vulnerability.
Haifeng Yang, G. Zhai, Yan Zhang
semanticscholar +1 more source
Assessing the Vulnerability of Buildings
Journal of Applied Fire Science, 2005PurposeThe purpose of this paper is to set forth a rigorous methodology for building owners and managers to conduct a vulnerability assessment of their facilities. Such a process would facilitate the use of remediation measures to limit the loss of life and property during a disaster, whether natural or man‐made.Design/methodology/approachThe author ...
openaire +3 more sources
SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing
International Conference on Internet of Things: Systems, Management and Security, 2019Blockchain has flourished in recent years. As a decentralized system architecture, smart contracts give the blockchain a user-defined logical concept. The smart contract is an executable program that can be used for automatic transactions on the Ethereum
Jian-Wei Liao+3 more
semanticscholar +1 more source
Assessment of Hypervisor Vulnerabilities
2016 International Conference on Cloud Computing Research and Innovations (ICCCRI), 2016Hypervisors are the main components for managing virtual machines on cloud computing systems. Thus, the security of hypervisors is very crucial as the whole system could be compromised when just one vulnerability is exploited. In this paper, we assess the vulnerabilities of widely used hypervisors including VMware ESXi, Citrix XenServer and KVM using ...
Sudsanguan Ngamsuriyaroj+1 more
openaire +2 more sources
2006
Publisher Summary This chapter presents the actual scanning of systems for vulnerabilities and discusses the reasons behind the necessity of performing such a scan. There are essentially three different reasons behind a vulnerability assessment: (1) to verify that the systems are not vulnerable or identify systems that are vulnerable; (2) to either ...
Chris Gatford+2 more
openaire +2 more sources
Publisher Summary This chapter presents the actual scanning of systems for vulnerabilities and discusses the reasons behind the necessity of performing such a scan. There are essentially three different reasons behind a vulnerability assessment: (1) to verify that the systems are not vulnerable or identify systems that are vulnerable; (2) to either ...
Chris Gatford+2 more
openaire +2 more sources
Beyond the Vulnerability Assessment
Opflow, 2004This article addresses some of the issues and constraints that must be considered when upgrading a facility and its assets to reduce the risk of malevolent attacks. Topics covered include: a historical look at security; security solutions; risk reduction, mitigation, and costs; and, confidentiality and procurement considerations.
Doug Herbst, Ron Booth, Robert Ainslie
openaire +2 more sources
2007
Publisher Summary Vulnerabilities are weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerabilities include structural, procedural, electronic, human, and other elements that provide opportunities to attack assets. They can be categorized as physical, technical, or operational.
openaire +2 more sources
Publisher Summary Vulnerabilities are weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerabilities include structural, procedural, electronic, human, and other elements that provide opportunities to attack assets. They can be categorized as physical, technical, or operational.
openaire +2 more sources
Assessing Social Vulnerability
2014A critical piece, and often the most neglected piece, of resilience to disaster is the identification and mapping of a community’s social vulnerabilities. When disaster strikes, its impact is not just a function of its magnitude and where it strikes.
Lori Feild Schwarz+5 more
openaire +2 more sources