Search

Your search keyword '"vulnerabilities"' showing total 685 results

Search Constraints

Start Over You searched for: Descriptor "vulnerabilities" Remove constraint Descriptor: "vulnerabilities" Database OpenAIRE Remove constraint Database: OpenAIRE
685 results on '"vulnerabilities"'

Search Results

1. Security Analysis of Simpel Desa using Mobile Security Framework and ISO 27002:2013

2. Vulnerabilities, ethical responsibility and acceptance of otherness during the first Covid lockdown: A case study of a French Care Centre for Support and Prevention in Addictology

3. Mujeres «solas» en el exilio. Vulnerabilidades, violencias y resistencias de las refugiadas españolas en Francia (1939-1978)

4. Conhecimentos sociotécnicos e comunitários para uma nova relação do saber-fazer no enfrentamento a desastres

5. Analyse du processus de renforcement des vulnérabilités dans les situations complexes d’autisme

6. Transmission Mechanisms of Economic Shocks in the Eurasian Economic Union

7. Implementació d'un ecosistema de compartició de ciberintel·ligència en un entorn domèstic

8. Assessment of soil erosion in the Autonomous District of Abidjan, Côte d'Ivoire

9. Review of the techniques and mechanisms for enhancing trust in internet of things for smart agriculture

10. Gender vulnerabilities in low-carbon energy transitions: A conceptual review

11. Concepts of Cyber Security

12. COVID-19, SDGs and public health systems: Linkages in Brazil

13. Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract

14. The Cybersecurity in Conditions of the Digital Transformation

15. ‘Leather on leather’: men with homosexual practices and HIV prevention in the Recife Metropolitan Region

16. Machine Learning Techniques to Combat Security Threats in Social Internet of Things

17. An overview of educational vulnerabilities in Brazil

18. The role of equipment vendors in 5G network security

19. Análisis de ciberseguridad en plataformas e-learning: revisión sistemática de la literatura

20. Vulnerabilidades y amenazas en los activos de información: una revisión sistemática

21. An adaptive framework for combating advanced persistent threats

22. Exploring the Security Implications of a Decentralized Internet : Vulnerabilities in Web3 and Blockchain-Based Networks

23. Journal of Systems and Software / A model-based mode-switching framework based on security vulnerability scores

24. Integration of Occupational Exposure into the Exposome

25. Evaluating Vulnerabilities and Misconfigurations in Software Using ChatGPT

26. Improving android application quality through extendable, automated security testing

27. SOCIAL AND PSYCHOLOGICAL CORRELATES OF THE MAJOR SOURCES OF DISCOMFORT PERCEIVED BY STUDENTS IN THE COVID-19 PANDEMIC: AN EXPLORATORY STUDY ON A ROMANIAN SAMPLE

28. Can Physical, Psychological, and Social Vulnerabilities Predict Ageism?

29. On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering

30. Sexual health promotion: challenges in the university scenario and strategies for dealing with risk behaviors

31. Prevention and care of risks and emergencies in the residential sector

32. La hiérarchie des vulnérabilités d’une politique d’expulsion des bidonvilles : le rôle du genre dans les mises à l’abri

33. Cybersecurity in Software Supply Chain And the role of SLTT Governance

34. Vivre en centre d’hébergement collectif dans l’attente d’un « logement à soi » : les épreuves du provisoire et les enjeux dans la scolarisation des enfants issus de l’asile

35. La (sur)vie en dehors des dispositifs d’hébergement institutionnel : exemples de débrouilles quotidiennes de familles exilées dans la Métropole bordelaise

36. Analysis of operational risks by land modality in Colombia: a look from the international standard BASC v5 - 2017

37. A HOMEGROWN AND HYBRID HUMAN SECURITY APPROACH FOR THE EASTERN CARIBBEAN

38. Security and privacy of IoT devices for aging in place

39. Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control

40. Tactics of invisibility : How people in vulnerable positions make datafied everyday life livable

41. Análisis de la vulnerabilidad Log4shell

42. Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance

43. Social and digital vulnerabilities: The role of participatory processes in the reconfiguration of urban and digital space

45. The Opinions on Force Protection in Asymmetric Operations

46. Geoethics and dimensions of vulnerability in Central Africa: the case study of the Democratic Republic of the Congo

47. COVID-19 magnifies the vulnerabilities: The Brazilian case

48. A Software Vulnerabilities Odysseus: Analysis, Detection, and Mitigation

49. Applications of Kali Linux Operating System

50. Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions

Catalog

Books, media, physical & digital resources