Search Results

You are looking at 1 - 10 of 710 items for :

  • "vulnerabilities" x
  • All content x
Clear All

, OK, EPA/600/2-85/0108, p. 163. - In: R. Gogu, A. Dassargues 1998: A short overview on groundwater vulnerability assessment - basic statements for use in the framework of the COST 620 Action. COST Action 65 1995

Restricted access

(Dialóg Campus 2008 ). Garry , J. , ‘ Why Me: Application and Misapplication 3A1.1 the Vulnerable Victim Enhancement of the Federal Sentencing Guidelines ’ ( 1993 ) 79

Full access
Pollack Periodica
Authors: Alina-Maria Nariţa, Vlad Gurza, Răzvan Opriţa, Alexandra Keller, Iasmina Apostol, Marius Moşoarcă, and Cătălina Bocan

. Seismic vulnerability assessment of historical masonry structural systems , Engineering Structures , Vol. 62-63 , 2014 , pp. 118 – 134 . [2] Gunay M. S

Restricted access

J. R. Taylor M. N. Potenza 2003 Developmental neurocircuitry of motivation in adolescence: A critical period of addiction vulnerability

Open access

-Leimkuhler 2003 The gender gap in suicide and premature death or: why are men so vulnerable? European Archives of Psychiatry and Clinical Neuroscience 253 1 8

Restricted access

Disease avoidance and ethnocentrism: the effects of disease vulnerability and disgust sensitivity on intergroup attitudes Evolution and Human Behavior 27 270 282

Restricted access

uses descriptors to classify level of illness and physical vulnerability, ranging from 1 (“ very fit ”) to 7 (“ severely frail and completely dependent on others for activities for daily living; or terminally ill ”). The instrument is recognized as

Open access

, we conducted a large study ( N  = 3,348) in nine Chinese vocational schools, which contain the largest proportion of vulnerable online gamers, and structural equation modeling (SEM) was employed to test our hypotheses. Empathy and

Open access

Összefoglalás. Jelen cikk célja a járműipar egyes területeit érintő kiberbiztonsági kockázatok vizsgálata. Fentiekkel összhangban a cikk első részében a járműipar kiberbiztonsági szempontból releváns területei kerülnek meghatározásra. Ezt követően megtörténik a 2018. évben rögzített járműipari kibertámadások kockázatalapú értékelő elemzése.

Summary. Nowadays, cybersecurity has a critical impact to our lives. The Internet has also got a substantial role in our days since many people are constantly connected to the Internet (e.g., through online social networks) . Besides, numerous personal and individual devices are connected. The growing number of connected devices and cyberspace expansion make our lives easier. However, this affects our privacy, with the potential for unauthorized use of personal information. In summary, life in a networked world carries unknown dangers.

In the future, many new risk factors are expected to occur, which will significantly increase the level of cybersecurity threats. Examining the aspects of the automotive industry, we should mention the summary of which explores the field’s problems through novel theoretical solutions and related practical considerations. The book pays special attention to vehicle communication and networked systems. This book examines three main scientific directions for 5G-compliant vehicle-to-vehicle communication and cooperative vehicle control: modeling and testing capabilities for vehicle-to-vehicle communication, state-of-the-art technologies related to the physical layer, and MAC design procedures .

Cheng and colleagues examined the communication channels currently applied in the automotive industry or that are expected to be applied soon. Particular attention has been paid to examining the tasks and challenges that need to be addressed in order to support the spread of the connected transport systems in the future. The evaluation focused on the cooperation of connected vehicles. Their study also outlined the most important security risks and challenges associated with new communication solutions.

In the light of the above-mentioned considerations, it can be said that the emergence of connected and autonomous vehicles can make a significant contribution to the positive effects of cyberspace, but can also have a disadvantageous impact on the vulnerability of transport processes.

In line with this, it is important to examine and understand the vulnerabilities of connected and autonomous vehicles, the threats to vehicles. With this knowledge, automotive cybersecurity professionals’ responsibility is to develop appropriate security functions and capabilities for connected and autonomous vehicles and transport systems. This enables the systems to detect, evaluate, and, if necessary, treat different attacks and malicious interventions.

Along with the above objectives, many research studies in the automotive segment have already focused on identifying cybersecurity assessment frameworks for motor vehicles. Among these, it is worth highlighting the projects “HEAling Vulnerabilities to ENhance Software Security and Safety” and “E-safety vehicle intrusion protected applications” .

Open access

Agricultural Vulnerability, World Summit on Sustainable Development, Johannesburg IPCC, 2000, Summary for Policymakers, Emissions Scenarios, Special Report of IPCC Working Group III, Intergovernmental Panel on Climate

Restricted access