Results 11 to 20 of about 184,016 (328)

iHVI: AN OPEN-SOURCE TOOLKIT FOR CONSTRUCTING INTEGRATED HEAT VULNERABILITY INDEX IN AUSTRALIA [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2022
To tackle the increasing issue of heat risk in Australia and pressure of population growth, this project aimed to establish a first nationwide dynamic and interactive heat vulnerability assessment toolkit.
Q. (C. ). Sun   +7 more
doaj   +1 more source

Vulnerabilities of Live-Streaming Services in Korea

open access: yesSensors, 2022
Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to ...
Sun-Hong Hwang   +6 more
doaj   +1 more source

A new method of software vulnerability detection based on a quantum neural network

open access: yesScientific Reports, 2022
In the field of network security, although there has been related work on software vulnerability detection based on classic machine learning, detection ability is directly proportional to the scale of training data.
Xin Zhou   +9 more
doaj   +1 more source

Comparative Analysis of 5G Mobile Communication Network Architectures

open access: yesApplied Sciences, 2020
Mobile communication technology is evolving from 4G to 5G. Compared to previous generations, 5G has the capability to implement latency-critical services, such as autonomous driving, real-time AI on handheld devices and remote drone control. Multi-access
Woosik Lee   +3 more
doaj   +1 more source

Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method [PDF]

open access: yesJournal of Universal Computer Science, 2019
With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and heterogeneous, which makes data fusion become more complex.
Xiaoling Tao   +4 more
doaj   +3 more sources

A security architecture for personal networks [PDF]

open access: yes, 2006
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M.   +1 more
core   +2 more sources

UNCERTAINTY HANDLING IN DISASTER MANAGEMENT USING HIERARCHICAL ROUGH SET GRANULATION [PDF]

open access: yesISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2015
Uncertainty is one of the main concerns in geospatial data analysis. It affects different parts of decision making based on such data. In this paper, a new methodology to handle uncertainty for multi-criteria decision making problems is proposed.
H. Sheikhian, M. R. Delavar, A. Stein
doaj   +1 more source

Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]

open access: yesJournal of Information, Communication and Ethics in Society, 2009
PurposeThe purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.Design/methodology/approachVulnerabilities in ...
Pieters, W., Consoli, L.
openaire   +2 more sources

Systems and methods for automated detection of application vulnerabilities [PDF]

open access: yes, 2018
*/Board of Regents, University of Texas ...
Greenwood, Garrett   +5 more
core   +1 more source

Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis

open access: yesFuture Internet, 2022
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”.
Fazal Raheman   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy