iHVI: AN OPEN-SOURCE TOOLKIT FOR CONSTRUCTING INTEGRATED HEAT VULNERABILITY INDEX IN AUSTRALIA [PDF]
To tackle the increasing issue of heat risk in Australia and pressure of population growth, this project aimed to establish a first nationwide dynamic and interactive heat vulnerability assessment toolkit.
Q. (C. ). Sun+7 more
doaj +1 more source
Vulnerabilities of Live-Streaming Services in Korea
Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to ...
Sun-Hong Hwang+6 more
doaj +1 more source
A new method of software vulnerability detection based on a quantum neural network
In the field of network security, although there has been related work on software vulnerability detection based on classic machine learning, detection ability is directly proportional to the scale of training data.
Xin Zhou+9 more
doaj +1 more source
Comparative Analysis of 5G Mobile Communication Network Architectures
Mobile communication technology is evolving from 4G to 5G. Compared to previous generations, 5G has the capability to implement latency-critical services, such as autonomous driving, real-time AI on handheld devices and remote drone control. Multi-access
Woosik Lee+3 more
doaj +1 more source
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method [PDF]
With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and heterogeneous, which makes data fusion become more complex.
Xiaoling Tao+4 more
doaj +3 more sources
A security architecture for personal networks [PDF]
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M.+1 more
core +2 more sources
UNCERTAINTY HANDLING IN DISASTER MANAGEMENT USING HIERARCHICAL ROUGH SET GRANULATION [PDF]
Uncertainty is one of the main concerns in geospatial data analysis. It affects different parts of decision making based on such data. In this paper, a new methodology to handle uncertainty for multi-criteria decision making problems is proposed.
H. Sheikhian, M. R. Delavar, A. Stein
doaj +1 more source
Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]
PurposeThe purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.Design/methodology/approachVulnerabilities in ...
Pieters, W., Consoli, L.
openaire +2 more sources
Systems and methods for automated detection of application vulnerabilities [PDF]
*/Board of Regents, University of Texas ...
Greenwood, Garrett+5 more
core +1 more source
Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”.
Fazal Raheman+3 more
doaj +1 more source