Vulnerability

Results: 14773



#Item
811Cyberwarfare / Security / Computer security / Computer network security / Cybercrime / National security / Threat / Vulnerability / Threat Intelligence Platform / Threat model

SANDIA REPORT SAND2007-5791 Unlimited Release Printed SeptemberCategorizing Threat

Add to Reading List

Source URL: www.idart.sandia.gov

Language: English - Date: 2009-05-07 12:36:27
812

KNOMAD WORKING PAPER 14 The Impact of Vulnerability and Resilience to Environmental Changes on Mobility Patterns in West Africa

Add to Reading List

Source URL: www.knomad.org

Language: English
    813Disaster preparedness / Emergency management / Social vulnerability / Disaster / Federal Emergency Management Agency / Peek / Preparedness / Hurricane Katrina

    CURRICULUM VITAE July 2012 Lori Peek, Ph.D. Department of Sociology Colorado State University B-237 Clark Building

    Add to Reading List

    Source URL: web.libarts.colostate.edu

    Language: English - Date: 2014-06-27 12:49:39
    814

    X European Mountain Convention Mountains’ vulnerability to climate change: how can people and territories adapt and mitigate its effects? 3 to 5 October 2016 Teatro Municipal de Bragança, Bragança, Portugal Draft pro

    Add to Reading List

    Source URL: www.euromontana.org

    Language: English
      815Economy / Economics / Consumer theory / Economic indicators / Consumption / Consumer spending / Consumer Expenditure Survey / Economic inequality / Brazilian Institute of Geography and Statistics / Elasticity / Labour economics / Income

      Construction of a Consumption Aggregate Based on Information from the Brazilian Consumer Expenditure Surveyand its use in the Measurement of Welfare, Poverty, Inequality and Vulnerability of Families Leonardo

      Add to Reading List

      Source URL: www.iariw.org

      Language: English - Date: 2013-09-12 09:48:01
      816Aid / Humanitarian aid / Poverty / Social security / Applied ethics / International relations / Economics

      Abstract for “Poverty transitions and vulnerability: Mexico” Víctor Hugo Pérez (University of Essex, UK) Isidro Soloaga (Universidad Iberoamericana, Mexico) Following recent developments made by Lanjouw a

      Add to Reading List

      Source URL: www.iariw.org

      Language: English - Date: 2013-05-24 14:20:23
      817

      The Extreme Vulnerability of Network of Networks Protein networks, Brain networks Physiological systems

      Add to Reading List

      Source URL: havlin.biu.ac.il

      Language: English - Date: 2013-07-18 15:55:25
        818Computer security / Cyberwarfare / Cybercrime / Address space layout randomization / Return-oriented programming / Vulnerability / Code injection / Software bugs / JIT spraying / PaX

        String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

        Add to Reading List

        Source URL: hexhive.github.io

        Language: English - Date: 2016-06-13 11:08:40
        819

        The extreme vulnerability of interdependent spatially embedded networks

        Add to Reading List

        Source URL: havlin.biu.ac.il

        Language: English - Date: 2013-10-20 05:07:18
          820Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

          Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

          Add to Reading List

          Source URL: hexhive.github.io

          Language: English - Date: 2016-06-13 11:08:40
          UPDATE