Zobrazeno 1 - 10
of 2 860
pro vyhledávání: '"vulnerability analysis"'
Publikováno v:
Natural Hazards Research, Vol 4, Iss 3, Pp 387-400 (2024)
Landslides are the most common natural hazards and can cause casualties and damage forests, roads, water conservancy, hydropower, and other infrastructure. Road networks are essential components of critical infrastructure networks. Damage from natura
Externí odkaz:
https://doaj.org/article/75b113796ce24d7bb2e156c4d7f9fca7
Publikováno v:
Zhongguo Jianchuan Yanjiu, Vol 19, Iss 3, Pp 166-173 (2024)
ObjectiveAiming at the urgent need for research on vulnerability analysis methods for ship targets, a vulnerability analysis method for supply ship targets under anti-ship missile strikes is proposed.MethodsTaking a typical supply ship target as the
Externí odkaz:
https://doaj.org/article/017ca16e90b2489cbaa0d67dd93bba00
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 17, Iss 1, Pp 1-12 (2024)
Abstract The improvement in transportation efficiency, security, safety, and environmental effects may be possible due to the impending advent of autonomous ships. Automatic situational awareness, risk detection, and intelligent decision-making are t
Externí odkaz:
https://doaj.org/article/b9407ca45cbc4fab99af6b02a1344944
Comparative analysis of automated scanning and manual penetration testing for enhanced cybersecurity
Autor:
Rane, Nikhil, Qureshi, Amna
Yes
Web platform security has become a significant concern in the current cyber world. Adversaries constantly advance their skills and technologies to bypass modern cyber defence techniques to lure website vulnerabilities. In the cyber world, fi
Web platform security has become a significant concern in the current cyber world. Adversaries constantly advance their skills and technologies to bypass modern cyber defence techniques to lure website vulnerabilities. In the cyber world, fi
Externí odkaz:
http://hdl.handle.net/10454/19971
Autor:
Colucci, Elisabetta, Matrone, Francesca, Noardo, Francesca, Assumma, Vanessa, Datola, Giulia, Appiotti, Federica, Bottero, Marta, Chiabrando, Filiberto, Lombardi, Patrizia, Migliorini, Massimo, Rinaldi, Enrico, Spanò, Antonia, Lingua, Andrea
Publikováno v:
Journal of Cultural Heritage Management and Sustainable Development, 2022, Vol. 14, Issue 2, pp. 205-234.
Publikováno v:
IEEE Access, Vol 12, Pp 112144-112156 (2024)
As the frequency and intensity of power line-induced wildfires increase due to climate-, human-, and infrastructure-related risk drivers, maintaining power system resilience and reducing environmental impacts become increasingly crucial. This paper p
Externí odkaz:
https://doaj.org/article/235daac8c6754f27995b31cb4c831118
Publikováno v:
Engineering, Vol 32, Iss , Pp 186-201 (2024)
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks, particularly with the dawn of the Industrial Internet-of-Things (IIoT). To gain a comprehensive understanding of these cyber risks, vulnerabilities of industrial r
Externí odkaz:
https://doaj.org/article/d3b3459521ae4516b9ad6207d03f8405
Autor:
Fang Qi, Kaitlin N. Smith, Travis LeCompte, Nian-feng Tzeng, Xu Yuan, Frederic T. Chong, Lu Peng
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 5, Pp 1-11 (2024)
While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood. Incomplete noise models have led to discrepancies between quantum program success rat
Externí odkaz:
https://doaj.org/article/a772d1661ba543f39767bdae415970e9
Autor:
Björn Gunnarsson
Publikováno v:
Arctic Review on Law and Politics, Vol 15 (2024)
This study analyses several vulnerabilities in the maritime transportation system of the Northern Sea Route (NSR). The vulnerabilities discussed are already impacting transport and logistics operations on the NSR. These vulnerabilities have greatly i
Externí odkaz:
https://doaj.org/article/02a50ed869f045848d3f33813eb49d0c
Autor:
Mathieu, Richard G., Turovlin, Alan E.
Publikováno v:
Information & Computer Security, 2023, Vol. 31, Issue 5, pp. 655-674.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-02-2023-0027