Sign Up to like & get
recommendations!
0
Published in 2018 at "Mathematical Methods in The Applied Sciences"
DOI: 10.1002/mma.4134
Abstract: Tsunamis are rare events compared with other extreme natural hazards, but the growth of population along coastlines has increased their potential impact. Tsunamis are most often generated by earthquake-induced dislocations of the seafloor, which displace…
read more here.
Keywords:
heraklion crete;
tsunami;
tsunamis;
vulnerability analysis ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Optimization Theory and Applications"
DOI: 10.1007/s10957-018-1264-y
Abstract: In this note, we combine two theories that have been proposed in the last decade: the theory of vulnerability and efficiency of a congested network, and the theory of stochastic variational inequalities. As a result,…
read more here.
Keywords:
vulnerability analysis;
analysis congested;
congested networks;
efficiency vulnerability ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Safety Science"
DOI: 10.1016/j.ssci.2018.04.026
Abstract: Abstract Transportation of dangerous goods has always been in the spotlight of terrorist groups with the aim of inflicting severe harm to humans and the environment. The purpose of this paper is to present a…
read more here.
Keywords:
transportation;
security vulnerability;
vulnerability analysis;
dangerous goods ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Scientific Reports"
DOI: 10.1038/s41598-021-87574-4
Abstract: Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability…
read more here.
Keywords:
attack;
vulnerability analysis;
experimental vulnerability;
qkd ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of the Operational Research Society"
DOI: 10.1080/01605682.2019.1609882
Abstract: Abstract In this article, project vulnerability is examined from a structural perspective using complex network theory. Based on its topological structure and specific features, the project is first abstracted as a weighted directed network, after…
read more here.
Keywords:
vulnerability analysis;
project;
network;
vulnerability ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Visualization and Computer Graphics"
DOI: 10.1109/tvcg.2018.2865028
Abstract: Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely…
read more here.
Keywords:
analysis network;
security;
vulnus visual;
vulnerability analysis ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Indonesian Journal of Electrical Engineering and Informatics"
DOI: 10.11591/ijeei.v9i1.2450
Abstract: A car electronic security system aims to prevent its theft, the theft of its parts or of elements in its interior. Studying these systems allows identifying and mitigating vulnerabilities. Nowadays, there are different types of…
read more here.
Keywords:
analysis locking;
attack;
vulnerability analysis;
brute force ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Sustainability"
DOI: 10.3390/su9030397
Abstract: Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by…
read more here.
Keywords:
vulnerability analysis;
tree loop;
analysis urban;
urban drainage ... See more keywords