124   Artículos

 
en línea
Wiwin Budiarti,Evi Gravitiani,Mujiyo Mujiyo     Pág. 96 - 108
Floods a main problem in Samin sub watershed, which is part of the Bengawan Solo watershed, Central Java Province. Assessment of the flood vulnerability level and its determinant causes is required as a basis information for policy makers to design a flo... ver más
Revista: Journal of Natural Resources and Environmental Management    Formato: Electrónico

 
en línea
Dan Meng, Yueming Liu, Zhihua Wang, Xiaomei Yang, Xiaoliang Liu, Junyao Zhang and Ku Gao    
From 2000 to 2020, storm surges occurred 397 times in China, resulting in direct economic losses of up to CNY 220.64 billion. Storm surges not only threaten safety but also cause property damage; hence, it is necessary to assess the changes in vulnerabil... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Valeria Mercuri, Martina Saletta and Claudio Ferretti    
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Ali Abbasi Tadi, Saroj Dayal, Dima Alhadidi and Noman Mohammed    
The vulnerability of machine learning models to membership inference attacks, which aim to determine whether a specific record belongs to the training dataset, is explored in this paper. Federated learning allows multiple parties to independently train a... ver más
Revista: Information    Formato: Electrónico

 
en línea
Anirudh Warrier, Saba Al-Rubaye, Gokhan Inalhan and Antonios Tsourdos    
Integrating autonomous unmanned aerial vehicles (UAVs) with fifth-generation (5G) networks presents a significant challenge due to network interference. UAVs? high altitude and propagation conditions increase vulnerability to interference from neighbouri... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Kevin Cresswell, Diana Mitsova, Weibo Liu, Maria Fadiman and Tobin Hindle    
Urbanization and warming climate suggest that health impacts from extreme heat will increase in cities, thus locating vulnerable populations is pivotal. However, heat vulnerability indices (HVI) overwhelmingly interpret one model that may be inaccurate o... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Elena A. Mikhailova, Lili Lin, Zhenbang Hao, Hamdi A. Zurqani, Christopher J. Post, Mark A. Schlautman, Gregory C. Post, George B. Shepherd and Sarah J. Kolarik    
Loss and damage (L&D) from climate change result from past and current greenhouse gas (GHG) emissions. Current definitions of L&D exclude GHG emissions even though they represent L&D to human beings and the environment. This study?s objective... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Kai Lehniger and Peter Langendörfer    
With the increasing popularity of IoT (Internet-of-Things) devices, their security becomes an increasingly important issue. Buffer overflow vulnerabilities have been known for decades, but are still relevant, especially for embedded devices where certain... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Subbarayan Saravanan, Devanantham Abijith, Parthasarathy Kulithalai Shiyam Sundar, Nagireddy Masthan Reddy, Hussein Almohamad, Ahmed Abdullah Al Dughairi, Motrih Al-Mutiry and Hazem Ghassan Abdo    
A tropical cyclone is a significant natural phenomenon that results in substantial socio-economic and environmental damage. These catastrophes impact millions of people every year, with those who live close to coastal areas being particularly affected. W... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Bahareh Lashkari and Petr Musilek    
With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract?s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods re... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 8     Siguiente »