Search

Your search keyword '"Vulnerability (computing)"' showing total 41 results

Search Constraints

Start Over You searched for: Descriptor "Vulnerability (computing)" Remove constraint Descriptor: "Vulnerability (computing)" Journal applied mechanics and materials Remove constraint Journal: applied mechanics and materials
41 results on '"Vulnerability (computing)"'

Search Results

1. Multiple Regression Model Using Performance Indices for Storage Capacity of a Reservoir System in Johor Catchment

2. The Systemic Approach to Information Protection in Relation to Risk in an Integrated Information Security System

3. A Grayscale Image Vulnerability Authentication System Based on Compressed Sensing

4. A Research of the Essence of SQL Injection Attacks Vulnerability

5. Power Grid Vulnerability Research Based on the Comprehensive Parameter

6. Analysis of Data Security Technology under Cloud

7. Association Rule Mining and Evaluation Based on Information Security Vulnerabilities Main Body

8. Study on the Quantitative Vulnerability Model of Information System Based on Mathematical Modeling Techniques

9. The Legislative Reference on Software Vulnerability of Foreign Critical Infrastructure

10. A Design of Information Security Curriculum Based on Social Networks and Edutainment

11. Evaluation Model of Road Network Vulnerability and its Genetic Algorithm Solution

12. Concrete Strength Variability in Italian RC Buildings: Analysis of a Large DataBase of Core Tests

13. Research on HGV Collisions with Concrete Bridge Piers

14. Vulnerability Assessment and Analysis of Active Distribution Network Structure

15. Directed Fuzzing Based on Dynamic Taint Analysis for Binary Software

16. Software Vulnerabilities Detection Based on Random Programming

17. Research of Immune Network Defense System Based on Black Hole Theory

18. A Novel Transmission Line Vulnerability Evaluation Method Based on Complex Network Theory

19. Enhancement of Test Platform for Web Application Security

20. Assessment Model and Method Research of Information Security Risk

21. Research on the Risk of Deep Foundation Excavation Engineering Management Based on RBS and AHP

22. Contribution to Diffusion Processes Application in the Area of Critical Infrastructure Security Assessment

23. Regional Vulnerability Analysis of Grid Structure

24. Analysis on Power Grid Vulnerability Considering Cascading Failure of Branch

25. Analysis of Power Grid Vulnerability Based on Electrical Dissection Method

26. Research on Vulnerability Assessment of Main Battle Tank Based on the DS Function Damage Tree Method

27. Operation Betweenness Based Assessment on Overload Vulnerability

28. The Design of Information System Vulnerability Management Software Based on CVSS

29. Research on Vulnerability Detection for Software Based on Taint Analysis

30. A Study of Vulnerability Detection and Prevention on Computer Network Security

31. Research on Vulnerability of Aquifer to Petroleum Hydrocarbon Basing on the ANN and GIS

32. Pattern Recognition Based on Integrative Vulnerability Mode for Elcctric Power Grid

33. Structural Vulnerability Evaluation Model Based on Improved Electrical Betweenness

34. The Analysis of Vulnerability in Low-Carbon Delivery System Using Analytical Hierarchy Process

35. Application of Common Information Model in Analyzing the Area of Vulnerability to Voltage Sags

36. Implementation of Secure GOOSE Protocol Using HSM

37. Corrective Maintenance Based Vulnerability Repair Procedure to Improve Web Application Security

38. Study on Software Vulnerability Discovering Based on Linux Sequence of System Call

39. Vulnerability Analysis for Steel Frame Structure Due to Strong Earthquakes

40. Review on the Research of Highway Bridges Seismic Damage Assessment

41. The Reinforced Concrete Structural Vulnerability Analysis under Earthquake Loads

Catalog

Books, media, physical & digital resources