|
|
|
Wiwin Budiarti,Evi Gravitiani,Mujiyo Mujiyo
Pág. 96 - 108
Floods a main problem in Samin sub watershed, which is part of the Bengawan Solo watershed, Central Java Province. Assessment of the flood vulnerability level and its determinant causes is required as a basis information for policy makers to design a flo...
ver más
|
|
|
|
|
|
|
Dan Meng, Yueming Liu, Zhihua Wang, Xiaomei Yang, Xiaoliang Liu, Junyao Zhang and Ku Gao
From 2000 to 2020, storm surges occurred 397 times in China, resulting in direct economic losses of up to CNY 220.64 billion. Storm surges not only threaten safety but also cause property damage; hence, it is necessary to assess the changes in vulnerabil...
ver más
|
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Ali Abbasi Tadi, Saroj Dayal, Dima Alhadidi and Noman Mohammed
The vulnerability of machine learning models to membership inference attacks, which aim to determine whether a specific record belongs to the training dataset, is explored in this paper. Federated learning allows multiple parties to independently train a...
ver más
|
|
|
|
|
|
|
Anirudh Warrier, Saba Al-Rubaye, Gokhan Inalhan and Antonios Tsourdos
Integrating autonomous unmanned aerial vehicles (UAVs) with fifth-generation (5G) networks presents a significant challenge due to network interference. UAVs? high altitude and propagation conditions increase vulnerability to interference from neighbouri...
ver más
|
|
|
|
|
|
|
Kevin Cresswell, Diana Mitsova, Weibo Liu, Maria Fadiman and Tobin Hindle
Urbanization and warming climate suggest that health impacts from extreme heat will increase in cities, thus locating vulnerable populations is pivotal. However, heat vulnerability indices (HVI) overwhelmingly interpret one model that may be inaccurate o...
ver más
|
|
|
|
|
|
|
Elena A. Mikhailova, Lili Lin, Zhenbang Hao, Hamdi A. Zurqani, Christopher J. Post, Mark A. Schlautman, Gregory C. Post, George B. Shepherd and Sarah J. Kolarik
Loss and damage (L&D) from climate change result from past and current greenhouse gas (GHG) emissions. Current definitions of L&D exclude GHG emissions even though they represent L&D to human beings and the environment. This study?s objective...
ver más
|
|
|
|
|
|
|
Kai Lehniger and Peter Langendörfer
With the increasing popularity of IoT (Internet-of-Things) devices, their security becomes an increasingly important issue. Buffer overflow vulnerabilities have been known for decades, but are still relevant, especially for embedded devices where certain...
ver más
|
|
|
|
|
|
|
Subbarayan Saravanan, Devanantham Abijith, Parthasarathy Kulithalai Shiyam Sundar, Nagireddy Masthan Reddy, Hussein Almohamad, Ahmed Abdullah Al Dughairi, Motrih Al-Mutiry and Hazem Ghassan Abdo
A tropical cyclone is a significant natural phenomenon that results in substantial socio-economic and environmental damage. These catastrophes impact millions of people every year, with those who live close to coastal areas being particularly affected. W...
ver más
|
|
|
|
|
|
|
Bahareh Lashkari and Petr Musilek
With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract?s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods re...
ver más
|
|
|
|