搜索结果: 1-15 共查到“Vulnerability”相关记录147条 . 查询时间(0.062 秒)
Researchers discover a new hardware vulnerability in the Apple M1 chip(图)
苹果M1芯片 硬件漏洞 数据安全 计算机安全
2023/6/20
Four takeaways from the IPCC’s report on climate adaptation and vulnerability(图)
IPCC 气候适应 脆弱性报告
2023/7/11
Fossil pollen samples suggest vulnerability to extinctions ahead(图)
Fossil pollen samples suggest vulnerability extinctions ahead
2020/9/4
Reduced resilience of plant biomes in North America could be setting the stage for the kind of mass extinctions not seen since the retreat of glaciers and arrival of humans about 13,000 years ago, cau...
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
Cryptography FPGA microprocessor
2019/6/26
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
Vulnerability and Remedy of Stripped Function Logic Locking
Logic Locking SAT-based Attack Stripped Function Logic Locking
2019/2/26
Stripped Function Logic Locking (SFLL) as the most advanced logic locking technique is robust against both the SAT-based and the removal attacks under the assumption of thorough resynthesis of the str...
LANDSCAPE VULNERABILITY ASSESSMENT USING REMOTE SENSING AND GIS TOOLS IN THE INDIAN PART OF KAILASH SACRED LANDSCAPE
KSL AHP Vulnerability Fire Flood Landslide
2019/2/27
The Indian part of Kailash Sacred Landscape (KSL) is prone to flash floods, landslides and forest fires leading to various environmental and socio-economic problems. This study aims to identify areas ...
FUZZY INTEGRATED DESERTIFICATION VULNERABILITY MODEL
Desertification Land Degradation Fuzzy Logic Vulnerability
2019/2/27
Desertification and Land Degradation have constantly affected the global environment over the years. Land degradation is a reduction or loss of productivity over land due to natural processes, climate...
MAPPING OF HIGHLY HETEROGENEOUS URBAN STRUCTURE TYPE FOR FLOOD VULNERABILITY ASSESSMENT
Urban Structure Type Object-based image analysis Random forest Support vector machine CART Flood vulnerability
2018/11/9
Vulnerability plays an important role in risk assessment. For flood vulnerability assessment, the map and characteristics of elements-at-risk at different scales are strongly required depending on the...
VULNERABILITY MAPPING AND ANALYSIS: AN IMPLEMENTATION IN GEOHAZARD AREAS IN SABAH
Landslide vulnerability Geospatial Landslide risk
2018/11/9
Vulnerability identifies the element-at-risk as well as the evaluation of their relationships with the hazard. The relationships relate the landslide potential damages over a specific element-at-risk....
ADAPTATION TO FLOODING EVENTS THROUGH VULNERABILITY MAPPING IN HISTORIC URBAN AREAS
Cultural heritage flooding climate change urban data model vulnerability assessment
2018/4/18
Historic urban areas are complex and inter-reliant systems, vulnerable to natural hazards. Over the recent years, the increase frequency in extreme precipitation events and sea-level rise, have impact...
FLOOD VULNERABILITY REDUCTION, USING A PARTIAL PARTICIPATORY GIS APPROACH. A STUDY CASE IN BAJA CALIFORNIA SUR, MEXICO
Participatory cartography loods cyclones vulnerability reduction
2018/4/18
A partial participatory GIS approach was implemented in a community in La Paz, Baja California Sur, Mexico to reduce vulnerability of floods caused by cyclones. A workshop was held to locate areas sus...
ADAPTATION TO FLOODING EVENTS THROUGH VULNERABILITY MAPPING IN HISTORIC URBAN AREAS
Cultural heritage flooding climate change urban data model vulnerability assessment
2018/5/8
Historic urban areas are complex and inter-reliant systems, vulnerable to natural hazards. Over the recent years, the increase frequency in extreme precipitation events and sea-level rise, have impact...
Combination of Features Produces New Android Vulnerability
Combination Features Produces Android Vulnerability
2017/7/20
A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used feature...