Science topics: GeographyVulnerability Analysis
Science topic
Vulnerability Analysis - Science topic
Explore the latest questions and answers in Vulnerability Analysis, and find Vulnerability Analysis experts.
Questions related to Vulnerability Analysis
Can electricity consumption (KWh) be used as an indicator or proxy variable for drought vulnerability assessment? What is the relationship between electricity consumption and drought vulnerability?
I am a Master's Student who specialized in development economics (especially rural development), now I am eager to publish my thesis in an academic journal. The topic is about determinants of vulnerability and roles of livelihood assets, so at this time, I would like to ask what kind of journal (paper) is more suitable? if possible, I would like to publish a high rank in terms of impact factors. thank you in advance.
Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
I wanted to do a Principal Component Analysis to reduce the number of variables used in the vulnerability analysis. Before running the PCA, it's necessary to standardize the variables collected in nominal (Yes/No) and in ordinal (rank). How can I do that? Any suggestion will be appreciated.
We're working on vulnerability studies of electric power systems and we found in some papers that the MATCASC software can be used in those studies. But we can't find where to download it.
1- I plan to do the vulnerability analysis of a pipleline subjected to debris flow. Apparently, I am unable to find research articles in this area. Please help me in finding some research articles in this area.
2- Can you please direct me towards some latest methods used for this vulnerability analsysIs?
3- How can I validate this vulnerability analysis?
I am a newbee in research and will appreciate any help in this regard.
What reference studies (Book, Article, Tesis etc) you know used ER Method was applied using the Vertical Electrical Survey (SEV) technique (Wenner-Schlumberger, dipole-dipole arrays) for definition of intrinsic vulnerability index to water contamination underground?
Are there any studies that have used this method to set parameters for analyzing groundwater vulnerability to contamination por geoelectric layers?
I'm learning about IT Security, mainly looking into the offensive side (PenTesting/Red Teaming).
I've been looking into PenTesting and some professional guidelines like these:
- http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
- http://www.pentest-standard.org/index.php/Pre-engagement
- http://www.pentest-standard.org/index.php/Intelligence_Gathering
- http://www.pentest-standard.org/index.php/Threat_Modeling
- http://www.pentest-standard.org/index.php/Vulnerability_Analysis
- http://www.pentest-standard.org/index.php/Exploitation
- http://www.pentest-standard.org/index.php/Post_Exploitation
- http://www.pentest-standard.org/index.php/Reporting
I've also seen some YouTube videos talking about what PenTesters do generally. However, I'd like to see some engagements (real or simulated) show what real PenTesting jobs are like and for all the main steps of the process. (like the ones listed in the links)
Is there somewhere I can read or watch about realistic PenTesting/Red Teaming engagements with details about each main step of the process?
Dear Researchers!
It is known that methods such as: GOD (Foster) and DRASTIC (Aller et al) and others are widely used. But are there new methods developed to evaluate the intrinsic vulnerability of the physical environment to loads or pollutants? and with easy application (accessible parameters)?
I need to define a topic,It should not be so extensive to be able to cover in a good way.My idea is to make a security comparison between two IoT technologies,however i feel the topic stills too much extensive
When we want to write a paper about Social vulnerability index, climate vulnerability index etc. we have to calculate index score first. But after that for finding out weighted index score we have to multiply the index score with the variables domain standard score like Demographic (25).
Now my question is where can i get all the variables list and domains weighted value for each vulnerability index?
I have 10 nodes in my network. I calculated the size of the largest component in my network, using the below formula:
Size of the largest component (when node 1 is deleted) = Number of nodes in the largest component, after node 1 is deleted/ Number of nodes in the largest component
Size of largest component, node 1 is deleted = 0.53
Size of largest component, node 2 is deleted = 0.85
Size of largest component, node 3 is deleted = 0.88
Size of largest component, node 4 is deleted = 0.94
Size of largest component, node 5 is deleted = 0.94
Size of largest component, node 6 is deleted = 0.94
Size of largest component, node 7 is deleted = 0.94
When I want to calculate robustness, do I have to average of all the above values?
Thank you
Priya
I am conducting a research on flood vulnerability and i want to know if the PAR model is the best or there is a more recent one now thanks.
I am doing research involving implementation of a security framework which can analyse 6LoWPAN (Network Layer in Internet of Things) and CoAP (Application Layer in Internet of things) for security weaknesses.
I have been able to find names of a few software like OMNET++, NS3, NS2 for network simulation, but I have no idea on how to simulate attacks on them. I also have Nessi2 which can simulate agent based security analysis, but I am not sure if I will be able to implement IOT layer security testing framework on it.
Any heads up on where to start and what to do next will be very helpful.
I am working on environmental babaseline studies on a soil creep environment in Nigeria. I am dividing the work into 3
1- Geotechnical analysis of the soil
2-- Application of hazard and vulnerability analysis on this hazards prone area
3- The environmental and socioeconomic impacts on the residents
Please I need scientific directions on how to go about it.
Thanks
I am trying to find some open source tools which provide binary tools vulnerability assessment?
Working on a current project, I was wondering if there were a large difference between the effect of (meteorological) droughts in mountain and plain regions. I am particularly interested here in possible negative effects on local farming and pastoralist production systems.
Any help on this point will be highly appreciated.
can anyone suggest me the best method for assessing coastal vulnerability to climate change? Is there any standard protocol to fix the vulnerability index?
please mention the tools used and also how vulnerable a community is.
Dear colleagues,
We know, everywhere and in everything the hazard exists without us, as a potential threat to all environmental and socio-economic components, in particular to humans and their welfare plus the vulnerability, immediately brings the negative consequences, exposure and susceptibility to losses cause the risk probability of hazard occurrence and in the end have the disaster, which makes the realization of a risk.
What is the ratio between hazard and risk when the vulnerability is at very low, low, modrate and high levels?
Thank you very much for opinion in advance!
Regards,
sir/ madam i m working as a researcher on the topic “Assessment of Livestock Owners - Wildlife Conflict in the Vicinity of National Park”.
I want to develop a index on livelihood vulnerability index, if any one have knowledge regarding this ,please share with me.
Identifying assets is the primary, and most critical step in threat modeling, because assets are essentially threat targets.
So, How we could determine that the list of assets is complete and be sure that we have not overlooked relevant assets?
I am interested in:
- synthesis of evidence for the elements that make up the model
- research on the introduction of S-V as a form of psychoeducation
- development of multimedia methods of explaining the model
- patient outcomes as a result of being exposed to S-V psychoeducation
I have found the patient acceptability for the model to be very high, but I foresee problems in being able to demonstrate patient outcomes - other than knowledge acquisition.
Thanks in advance,
Richard.
I have been studying vulnerability discovery models (VDMs) for a time. Most VDMs are focusing on predicting the number of vulnerabilities of a software. But I am focusing on predicting the location of vulnerabilities. A software is composed of several modules. By learning the vulnerability history of a software, it is possible to build a model that can predict the location where the next vulnerability will occur, or predict the probabilities for each module that the next vulnerability will occur.
Therefore, I am searching for a vulnerability data set that not only contains the vulnerability's ID and its occurrence time, but also the location where it occurs. Vulnerability databases such as NVD contains the description of vulnerabilites. It is possible to confirm the location of each vulnerability. But that is a labrious work since so many pieces of vulnerability should be processed. Therefore, I am looking for such an avaiable data set? Do you have any information or suggestions?
I prepared physical and social vulnerability maps of Seoul and Busan megacities. But I could not find the methods to validate those maps.
I want to develop a framework to assess regional vulnerability taking into consideration climate change impacts to natural resources.
1) I would like to know various mathematical and statistical methods used to check the accuracy of vulnerability maps generated by groundwater vulnerability assessment models such as DRASTIC, GOD, AVI and so on
2) How to validate the geospatial maps generated by vulnerability assessment models?
Kindly let me if there is any relevant paper for this purpose.
Also, is the physical investigation only option to validate the theoretical results obtained by vulnerability assessment models?
Usually an Internet search would return billions of results when the following keywords are looked up, 'disaster statistics' or 'natural hazard statistics'. Further exploration reveals official and unofficial numbers. To complicate matters there are various news reports which furnish unverified figures. Although I believe it may not be that easy to come to a consensus on putting a numerical figure on the losses but still where does one look for the right sources.
Having said that, I would appreciate if I can get some help in identifying the legitimate sources. It doesn't matter if it is at the International, national, regional or even local level.
In recent years, the term resilience has gained importance in the literature on climate change replacing the concept of vulnerability which, for several decades, allowed to reveal the social origin of disasters but, How can the participation of society can be addressed in each of them? Or are they just antonyms?
En los últimos años, el término resiliencia ha cobrado importancia en la literatura sobre cambio climático, reemplazando al concepto de vulnerabilidad el cual, desde hace algunas décadas permitió revelar el origen social de los desastres, pero ¿cómo se puede abordar la participación de la sociedad en cada uno de ellos? O ¿simplemente son antónimos?
Penetration testing is a very difficult and complex task in network security testing. How can we automate this process? Which tools or demo and test versions are available?
Assessment of human exposure is widely considered the starting point for social vulnerability mapping. Despite increasing efforts in building exposure databases even on global scale, there are still no commonly accepted definitions..