Results 41 to 50 of about 6,055,547 (381)
A Review of Structural Vulnerability Assessment Methods in the Advent of a Tsunami [PDF]
The interaction between hazard and exposure gives rise to risk. Tsunami risk assessment is derived from both hazard assessment and vulnerability assessment.
Baouham Asma+2 more
doaj +1 more source
A spatially explicit and quantitative vulnerability assessment of ecosystem service change in Europe [PDF]
Environmental change alters ecosystem functioning and may put the provision of services to human at risk. This paper presents a spatially explicit and quantitative assessment of the corresponding vulnerability for Europe, using a new framework designed ...
Cramer, W.+3 more
core +3 more sources
Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards [PDF]
The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction.
M. Papathoma-Köhle
doaj +1 more source
The coastal landscape of the Maltese Islands is the result of long-term evolution, influenced by tectonics, geomorphological processes, and sea level oscillations.
A. Rizzo+4 more
semanticscholar +1 more source
LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment Through Program Metrics [PDF]
Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective vulnerability assessment; i.e., it can greatly help security experts put their time and effort to where it is needed most.
Xiaoning Du+6 more
semanticscholar +1 more source
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya+2 more
doaj +1 more source
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
The paper presents the conceptual framework for assessing the level of security of automated systems based on their vulnerability. The analysis of regulatory standards, methodological recommendations and regulatory documents in the field of assessment ...
Aleksey O. Efimov+3 more
doaj +1 more source
Significance Forecasts of species vulnerability and extinction risk under future climate change commonly ignore local adaptations despite their importance for determining the potential of populations to respond to future changes.
O. Razgour+9 more
semanticscholar +1 more source
Research on Natural Gas Leakage and Explosion Mechanisms in a Container House
As unconventional building structures, container houses are now widely used in urban tourism to create characteristic buildings. Nowadays, natural gas accidents occur frequently in cities and towns; however, the development of laws and influencing ...
Yonghong Gao+6 more
doaj +1 more source