Vulnerability assessment
4,237 Followers
Recent papers in Vulnerability assessment
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to... more
This paper examines humanitarian assistance practices to understand how approaches followed by various actors address-or fail to address-social vulnerability to disasters. This question is addressed through a study of humanitarian... more
In Santiago de Chile, the combination of recent urbanization patterns, the growing demand for land, and climate change has created challenges, notably in terms of the amplification of hazard generation and hazard exposure. This paper... more
The transformation of the European infrastructure creates considerable system security challenges. GRID is a joint effort of six European research organizations to achieve consensus on the key issues involved by ICT related... more
The study evaluates the impacts of flash flood (especially 2017 massive flash flood) and explores prevailing adaptation strategies taken by haor inhabitants to subdue the impact. Primary data were collected through field visit,... more
The earthquake of the 9th of July 1998 that hit in the central group of the Azores archipelago greatly affected the islands of Faial, Pico and São Jorge, reaching a magnitude of Mw 6.2 with the epicentre located about 15km northeast of... more
Medical training devices are becoming increasingly dependent on technology creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and... more
iii-iv References 277-308 iv Abstract When we are confronted with vulnerable people, with those groups and individuals who are impaired with respect to their ability to function as the rational, autonomous and moral agents that we... more
An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and... more
The research develops in the context of processes of sustainable adaptive reuse on urban scale. The document proposes a participatory methodological approach that, integrating interviews with privileged interlocutors and performance... more
So far, however, the processes and mechanisms necessary for implementing the recommendations of these assessments at local levels have received relatively little attention. This is partly because of the conventional disconnection between... more
The ''PTVAM'' tsunami vulnerability assessment model [Papathoma and Dominey-Howes: 2003, Nat. Hazards Earth Syst. Sci. 3, 733-744; Papathoma et al.: 2003, Nat. Hazards Earth Syst. Sci. 3, 377-389], like all models, requires validation. We... more
El concepto de sustentabilidad de los asentamientos humanos implica la exigencia de que las actividades de producción del medio ambiente construido sean perdurables en el largo plazo y minimicen la afectación del medio ambiente natural.... more
Earthquakes and tsunamis along Morocco's coasts have been reported since historical times. The threat posed by tsunamis must be included in coastal risk studies. This study focuses on the tsunami impact and vulnerability assessment of the... more
There is growing demand among stakeholders across public and private institutions for spatially-explicit information regarding vulnerability to climate change at the local scale. However, the challenges associated with mapping the... more
Weak linkages between health providers and slum communities hinder the improvement of health services for India's urban poor. To address this issue, an urban health programme is implementing two approaches in Indore city, Madhya Pradesh,... more
Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was... more
Vulnerability is a multidimensional concept associated with high uncertainty in measurement and classification. Developing a vulnerability index from the diverse and often incommensurate data that form the basis of vulnerability... more
The report provides a first theoretical setting on the concept of vulnerability, vulnerability assessment and indicators in order to identify and evaluate relevant assessment measures for the CLUVA project. It describes a set of... more
The current study aims to assess the level of socio-economic vulnerability to floods and flash-floods (FF) in the context of environmental change, as well as in relation to the mitigation measures undertaken by local authorities to cope... more
Abstract-Today's computer systems are under relentless attack from cyber attackers armed with sophisticated vulnerability search and exploit development toolkits. To protect against such threats, we are developing FUZZBUSTER, an... more
Attacks against computer systems and the data contained within these systems are becoming increasingly frequent and evermore sophisticated. So-called “zero-day” exploits can be purchased on black markets and Advanced Persistent Threats... more
Detailed exploration of the United States Army’s Red Team and the methodology it uses to assess the information assurance defensive posture of processes, systems or organizations in an operational military environment. This paper will... more
Despite their diversity and extreme popularity with humans, hummingbirds have received relatively little attention from a conservation standpoint. The Hummingbird Monitoring Network (HMN) was started in 2002 to address the conservation... more
This article aims to analyse the dimensions of vulnerability in the complex territorial ecosystem of the Democratic Republic of the Congo, considering some substantial geoethical considerations and guidelines, usefull for the resolution... more
How does anybody describe the difference between simply being heard and really being listened to? Listening is an art. When someone has been harmed, understanding the person’s situation can be like fitting puzzle pieces together. It means... more
Collana diretta da Catia GiaConi, Pier GiusePPe rossi, simone aPareCida CaPellini la collana "traiettorie inclusive" vuole dare voce alle diverse proposte di ricerca che si articolano intorno ai paradigmi dell'inclusione e della... more
Transportasi laut merupakan salah satu sektor yang berperan dalam pembangunan nasional, yang melayani bongkar muat barang/produk maupun mengantarkan penumpang melalui pelabuhan. Salah satu prioritas dari pelayanan transportasi laut... more
Terrestrial ecosystems provide a number of vital services for people and society, such as biodiversity, food, fibre, water resources, carbon sequestration, and recreation. The future capability of ecosystems to provide these services is... more
page 327 Introduction 328 Methodology 329 Results 330 Distribution, habitat and abundance Biology Fishery and traditional use Trade, value and mariculture Regulations and conservation status Discussion Acknowledgements 361 References 361
Storms, floods, fires, tsunamis, earthquakes, tornadoes, and other disasters seem not only more frequent but also closer to home. As the world faces this onslaught, we have placed our faith in “sustainable development,” which promises... more
Les échelles d’évaluation sont utilisées dans le cadre des soins aux personnes âgées. Elles sont utiles pour estimer la charge de travail, les besoins en termes de ressources, la dépendance ou l’autonomie du patient, ou ses besoins. Le... more
The study aims to assess the vulnerability of farmers in cassava growing areas of Lower Apayao. Specifically, it is intended to: a. determine the degree of exposure to climate change hazards of the cassava growing communities in Apayao;... more
Little is known about the vulnerability to landslides, despite landslides causing frequent and widespread damage to the population and the built-up environment in many areas of the world. Lack of information about vulnerability to... more
The karst environment is one of the most challenging in terms of groundwater, engineering and environmental issues. Geophysical methods can provide useful subsurface information in karst regions concerning, for instance, hazard estimation... more
Many people live in rural areas in tropical regions. Rural development is not merely a contribution to the growth of individual countries. It can be a way to reduce poverty and to increase access to water, health care, and ducation.... more
This paper presents the comparison and analysis of vulnerabilities in modern Windows operating systems. Modern tools available on the Internet have been used in order to provide evidence regarding vulnerabilities in most Windows OS... more
This study presents a largely indicator-based assessment of past and projected climate change, impacts and the associated vulnerabilities of and risks to ecosystems, agriculture, water recourses, forestry, bioclimatic conditions, human... more
The Philippines is considered as a climate “hotspot” and is widely regarded as one of the world’s most disaster-prone countries reflecting both its high incidence of natural hazard events and significant vulnerability. Due to its... more