Results 41 to 50 of about 6,055,547 (381)

A Review of Structural Vulnerability Assessment Methods in the Advent of a Tsunami [PDF]

open access: yesE3S Web of Conferences
The interaction between hazard and exposure gives rise to risk. Tsunami risk assessment is derived from both hazard assessment and vulnerability assessment.
Baouham Asma   +2 more
doaj   +1 more source

A spatially explicit and quantitative vulnerability assessment of ecosystem service change in Europe [PDF]

open access: yes, 2008
Environmental change alters ecosystem functioning and may put the provision of services to human at risk. This paper presents a spatially explicit and quantitative assessment of the corresponding vulnerability for Europe, using a new framework designed ...
Cramer, W.   +3 more
core   +3 more sources

Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards [PDF]

open access: yesNatural Hazards and Earth System Sciences, 2016
The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction.
M. Papathoma-Köhle
doaj   +1 more source

Coastal Vulnerability Assessment along the North-Eastern Sector of Gozo Island (Malta, Mediterranean Sea)

open access: yesWater, 2020
The coastal landscape of the Maltese Islands is the result of long-term evolution, influenced by tectonics, geomorphological processes, and sea level oscillations.
A. Rizzo   +4 more
semanticscholar   +1 more source

LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment Through Program Metrics [PDF]

open access: yesInternational Conference on Software Engineering, 2019
Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective vulnerability assessment; i.e., it can greatly help security experts put their time and effort to where it is needed most.
Xiaoning Du   +6 more
semanticscholar   +1 more source

SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)

open access: yesBuana Information Technology and Computer Sciences, 2022
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya   +2 more
doaj   +1 more source

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

Conceptual foundations for assessing the level of security of automated systems based on their vulnerability

open access: yesБезопасность информационных технологий, 2023
The paper presents the conceptual framework for assessing the level of security of automated systems based on their vulnerability. The analysis of regulatory standards, methodological recommendations and regulatory documents in the field of assessment ...
Aleksey O. Efimov   +3 more
doaj   +1 more source

Considering adaptive genetic variation in climate change vulnerability assessment reduces species range loss projections

open access: yesProceedings of the National Academy of Sciences of the United States of America, 2019
Significance Forecasts of species vulnerability and extinction risk under future climate change commonly ignore local adaptations despite their importance for determining the potential of populations to respond to future changes.
O. Razgour   +9 more
semanticscholar   +1 more source

Research on Natural Gas Leakage and Explosion Mechanisms in a Container House

open access: yesBuildings
As unconventional building structures, container houses are now widely used in urban tourism to create characteristic buildings. Nowadays, natural gas accidents occur frequently in cities and towns; however, the development of laws and influencing ...
Yonghong Gao   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy