Computational complexity of network vulnerability analysis
Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute.
Berberler Murat Erşen
doaj +3 more sources
Enhancement of groundwater resources quality prediction by machine learning models on the basis of an improved DRASTIC method [PDF]
Determining situation of groundwater vulnerability plays a crucial role in studying the groundwater resource management. Generally, the preparation of reliable groundwater vulnerability maps provides targeted and practical scientific measures for the ...
Ali Bakhtiarizadeh+2 more
doaj +2 more sources
INTEGRATED ESTIMATION OF SEISMIC PHYSICAL VULNERABILITY OF TEHRAN USING RULE BASED GRANULAR COMPUTING [PDF]
Tehran, the capital of Iran, is surrounded by the North Tehran fault, the Mosha fault and the Rey fault. This exposes the city to possibly huge earthquakes followed by dramatic human loss and physical damage, in particular as it contains a large number ...
H. Sheikhian, M. R. Delavar, A. Stein
doaj +3 more sources
UNCERTAINTY MANAGEMENT IN SEISMIC VULNERABILITY ASSESSMENT USING GRANULAR COMPUTING BASED ON COVERING OF UNIVERSE [PDF]
Earthquake is an abrupt displacement of the earth's crust caused by the discharge of strain collected along faults or by volcanic eruptions. Earthquake as a recurring natural cataclysm has always been a matter of concern in Tehran, capital of Iran, as a ...
F. Khamespanah, M. R. Delavar, M. Zare
doaj +3 more sources
Security Threats on Cloud Computing Vulnerabilities [PDF]
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment.
Te‐Shun Chou
openalex +2 more sources
Objective. In decision making when comparing alternatives, it is often necessary to work with different values or estimates that are still important.
S. V. Razumnikov
doaj +2 more sources
Enhancing Microservice Security Through Vulnerability-Driven Trust in the Service Mesh Architecture [PDF]
Cloud-native computing enhances the deployment of microservice architecture (MSA) applications by improving scalability and resilience, particularly in Beyond 5G (B5G) environments such as Sixth-Generation (6G) networks.
Rami Alboqmi, Rose F. Gamble
doaj +2 more sources
Cloud Computing Security Aspects, Vulnerabilities and Countermeasures
Security issue in cloud computing is an active area of research. Thousands of users are connecting to a cloud daily for their day to day work. Unfortunately they are ignorant about the risk involved while doing transactions on the internet. End user systems as well as cloud based data centers must be able to overcome the threats due to Viruses, Trojan ...
Sarang V.Hatwar, Radhika Chavan
openalex +3 more sources
Adversarial attacks and defenses in physiological computing: a systematic review
Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based ...
Wu Dongrui+7 more
doaj +1 more source
PHYSICAL SEISMIC VULNERABILITY ASSESSMENT OF TEHRAN USING THE INTEGRATION OF GRANULAR COMPUTING AND INTERVAL DEMPSTER- SHAFER [PDF]
Several faults exist in the vicinity of Tehran, the capital of Iran such as North Tehran, Ray, Mosha and Kahrizak. One way to assist reducing the damage caused by the earthquake is the production of a seismic vulnerability map.
M. R. Delavar+3 more
doaj +1 more source