Articles with "vulnerability analysis" as a keyword



Photo by mpikman from unsplash

Numerical modeling of tsunamis and tsunami vulnerability analysis for Heraklion, Crete

Sign Up to like & get
recommendations!
Published in 2018 at "Mathematical Methods in The Applied Sciences"

DOI: 10.1002/mma.4134

Abstract: Tsunamis are rare events compared with other extreme natural hazards, but the growth of population along coastlines has increased their potential impact. Tsunamis are most often generated by earthquake-induced dislocations of the seafloor, which displace… read more here.

Keywords: heraklion crete; tsunami; tsunamis; vulnerability analysis ... See more keywords
Photo by dawson2406 from unsplash

Efficiency and Vulnerability Analysis for Congested Networks with Random Data

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Optimization Theory and Applications"

DOI: 10.1007/s10957-018-1264-y

Abstract: In this note, we combine two theories that have been proposed in the last decade: the theory of vulnerability and efficiency of a congested network, and the theory of stochastic variational inequalities. As a result,… read more here.

Keywords: vulnerability analysis; analysis congested; congested networks; efficiency vulnerability ... See more keywords
Photo by cokdewisnu from unsplash

A security vulnerability analysis model for dangerous goods transportation by rail – Case study: Chlorine transportation in Texas-Illinois

Sign Up to like & get
recommendations!
Published in 2018 at "Safety Science"

DOI: 10.1016/j.ssci.2018.04.026

Abstract: Abstract Transportation of dangerous goods has always been in the spotlight of terrorist groups with the aim of inflicting severe harm to humans and the environment. The purpose of this paper is to present a… read more here.

Keywords: transportation; security vulnerability; vulnerability analysis; dangerous goods ... See more keywords
Photo from wikipedia

Experimental vulnerability analysis of QKD based on attack ratings

Sign Up to like & get
recommendations!
Published in 2021 at "Scientific Reports"

DOI: 10.1038/s41598-021-87574-4

Abstract: Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability… read more here.

Keywords: attack; vulnerability analysis; experimental vulnerability; qkd ... See more keywords
Photo by dawson2406 from unsplash

Project vulnerability analysis: A topological approach

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of the Operational Research Society"

DOI: 10.1080/01605682.2019.1609882

Abstract: Abstract In this article, project vulnerability is examined from a structural perspective using complex network theory. Based on its topological structure and specific features, the project is first abstracted as a weighted directed network, after… read more here.

Keywords: vulnerability analysis; project; network; vulnerability ... See more keywords
Photo by dawson2406 from unsplash

Vulnus: Visual Vulnerability Analysis for Network Security

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Visualization and Computer Graphics"

DOI: 10.1109/tvcg.2018.2865028

Abstract: Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely… read more here.

Keywords: analysis network; security; vulnus visual; vulnerability analysis ... See more keywords
Photo from wikipedia

Vulnerability analysis in RF locking systems of vehicles in Bogotá, Colombia.

Sign Up to like & get
recommendations!
Published in 2021 at "Indonesian Journal of Electrical Engineering and Informatics"

DOI: 10.11591/ijeei.v9i1.2450

Abstract: A car electronic security system aims to prevent its theft, the theft of its parts or of elements in its interior. Studying these systems allows identifying and mitigating vulnerabilities. Nowadays, there are different types of… read more here.

Keywords: analysis locking; attack; vulnerability analysis; brute force ... See more keywords
Photo from wikipedia

Vulnerability Analysis of Urban Drainage Systems: Tree vs. Loop Networks

Sign Up to like & get
recommendations!
Published in 2017 at "Sustainability"

DOI: 10.3390/su9030397

Abstract: Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by… read more here.

Keywords: vulnerability analysis; tree loop; analysis urban; urban drainage ... See more keywords