Academic literature on the topic 'Vulnerability Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerability Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Vulnerability Management"
Ozyurt, Gulizar, Aysen Ergin, and Cuneyt Baykal. "COASTAL VULNERABILITY ASSESSMENT TO SEA LEVEL RISE INTEGRATED WITH ANALYTICAL HIERARCHY PROCESS." Coastal Engineering Proceedings 1, no. 32 (January 29, 2011): 6. http://dx.doi.org/10.9753/icce.v32.management.6.
Full textSancho, Francisco, Filipa S. B. F. Oliveira, and Paula Freire. "COASTAL DUNES VULNERABILITY INDEXES: A NEW PROPOSAL." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 68. http://dx.doi.org/10.9753/icce.v33.management.68.
Full textPosada-Vanegas, Gregorio, Gerardo Durán-Valdez, Rodolfo Silva-Casarin, Maria Elena Maya-Magaña, and Jose Antonio Salinas-Prieto. "VULNERABILITY TO COASTAL FLOODING INDUCED BY TROPICAL CYCLONES." Coastal Engineering Proceedings 1, no. 32 (January 31, 2011): 19. http://dx.doi.org/10.9753/icce.v32.management.19.
Full textNarayan, Siddharth, Robert J. Nicholls, Ekaterina Trifonova, Mariana Filipova – Marinova, Iliyan Kotsev, Stoyan Vergiev, Susan Hanson, and Derek Clarke. "COASTAL HABITATS WITHIN FLOOD RISK ASSESSMENTS: ROLE OF THE 2D SPR APPROACH." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 12. http://dx.doi.org/10.9753/icce.v33.management.12.
Full textAleksic, Aleksandar, Hrvoje Puskaric, Danijela Tadic, and Miladin Stefanovic. "Project management issues: vulnerability management assessment." Kybernetes 46, no. 7 (August 7, 2017): 1171–88. http://dx.doi.org/10.1108/k-08-2016-0218.
Full textOkuda, Takeshi, and Suguru Yamaguchi. "Lightweight Vulnerability Management System." Journal of Information Processing 16 (2008): 157–64. http://dx.doi.org/10.2197/ipsjjip.16.157.
Full textHardin, Eric, Helena Mitasova, and Margery Overton. "GIS-BASED ANALYSIS OF STORM VULNERABILITY CHANGE AT PEA ISLAND, NC." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 75. http://dx.doi.org/10.9753/icce.v33.management.75.
Full textWalkowski, Michał, Jacek Oko, and Sławomir Sujecki. "Vulnerability Management Models Using a Common Vulnerability Scoring System." Applied Sciences 11, no. 18 (September 19, 2021): 8735. http://dx.doi.org/10.3390/app11188735.
Full textPodsevalov, Artem G., and Mikhail I. Kudinov. "Issues of using vulnerability prioritization algorithms when organizing the vulnerability management process." Digital technology security, no. 1 (March 26, 2024): 52–73. http://dx.doi.org/10.17212/2782-2230-2024-1-52-73.
Full textHaerens, Piet, Paolo Ciavola, Óscar Ferreira, Ap Van Dongeren, Mark Van Koningsveld, and Annelies Bolle. "ONLINE OPERATIONAL EARLY WARNING SYSTEM PROTOTYPES TO FORECAST COASTAL STORM IMPACTS (CEWS)." Coastal Engineering Proceedings 1, no. 33 (October 25, 2012): 45. http://dx.doi.org/10.9753/icce.v33.management.45.
Full textDissertations / Theses on the topic "Vulnerability Management"
White, Dominic Stjohn Dolin. "Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006510.
Full textTeX output 2007.02.08:2212
Adobe Acrobat 9.51 Paper Capture Plug-in
Persson, Andreas, and Lukas Landenstad. "Explaining change : Comparing network snapshots for vulnerability management." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16710.
Full textBakgrund. Sårbarhetshantering underlättar arbetet för företag att hitta, hantera och korrigera sårbarheter i ett nätverk. Det görs genom att skanna nätverket efter kända sårbarheter. Mängden information som samlas under skanningar kan vara stor och medföra till att analysprocessen av upptäckterna försenas. Resultaten av de upptäckta sårbarheterna brukar vanligtvis presenteras som en trend av antalet funna sårbarheter över ett tidsintervall. Trenderna förklarar dock inte andledningen till de funna sårbarheterna. Syfte. Målet med denna avhandling är att undersöka hur det är möjligt att identifiera anledningen till skillnaden i funna sårbarheter genom att jämföra sårbarhetsrapporter från olika tidpunkter. Ett andra mål är att utveckla ett automatiskt system som kopplar skillnaderna i funna sårbarheter till specifika händelser i nätverket. Metod. En fallstudie utfördes där tre sårbarhetsrapporter, från Outpost24s interna testnätverk, undersöktes för att få förståelse kring strukturen av rapporterna samt för att koppla upptäckter i rapporterna till händelser. För att komplementera fallstudien satte vi upp ett nytt, simulerat testnätverk för att kunna utföra egna tester samt för att uppnå en högre precision vid identifiering av förändringar. Resultat. Utifrån fallstudien fick vi förståelse för hur vi skulle tolka informationen från rapporterna samt för hur man kan ge orsak till förändring genom ett regelbaserad system. Informationen från rapporterna tolkades och förändringarna delades in i tre olika kategorier; tillagda, borttagna eller modifierade. Utifrån testerna från det simulerade nätverket byggdes signaturer som identifierar orsak till föränding av funna sårbarheter. Signaturerna användes sedan för att göra regler, vilka implementerades i ett konceptverktyg. Konceptverktyget jämförde sårbarhetsrapporter i par för att upptäcka skillnader. De identifierade skillnaderna försökte sedan matchas ihop med reglerna och skulle skillnaden inte matcha någon regel så flaggas skillnaden som ''oförklarad''. Konceptverktyget användes slutligen för att finna orsak till förändringar i rapporterna från fallstudien. Ramverket validerates genom att utvärdera hur reglerna byggda utifrån det simulerade nätverket presterade för fallstudien. En domänexpert verifierade att händelserna som presenterades och orsaken till förändringarna var korrekta genom att analysera sårbarhetsrapporterna från fallstudien manuellt. Slutsatser. Det är möjligt att identifiera orsak till förändringar i upptäckta sårbarheter i sårbarhetsrapporter genom att identifiera signaturer för händelser, och använda dessa signaturer i ett reglerbaserat system. Systemet är också möjligt att implementera automatiskt, i form av mjukvara, för att kunna identifiera orsaken till förändring snabbare än om det skulle gjorts manuellt.
Yue, Yanchao. "Impact of Seismic Vulnerability on Bridge Management Systems." Doctoral thesis, Università degli studi di Trento, 2011. https://hdl.handle.net/11572/368074.
Full textYue, Yanchao. "Impact of Seismic Vulnerability on Bridge Management Systems." Doctoral thesis, University of Trento, 2011. http://eprints-phd.biblio.unitn.it/792/1/YUEthesis_final20120530.pdf.
Full textFlores, Ballesteros Luis. "Vulnerability and social risk management in India and Mexico." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45372.
Full textIncludes bibliographical references (p. 105-116).
The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals and groups, and the factors that foster the adoption of specific mechanisms of risk management and, thus, the elements that supports an efficient implementation process. This thesis contributes to this understanding in the context of communities in developing countries by using data from surveys conducted in the district of Kalahandi, state of Orissa, India, and three municipalities in Mexico, each with a different level of socioeconomic development: Villaflores, Chiapas; Ahome, Sinaloa; and Valle de Santiago, Guanajuato. Using regression modeling of binary response variables, I tested the statistical association between the adoption of formal social risk-management and a number of endogenous and exogenous household characteristics. The results indicate that the likelihood of adoption of formal risk-management strategies increases with the level of the household's association, i.e., its affiliation with local groups; in addition, proximity to roads, financial services and urban-mixed use areas (markets), is less strongly correlated with the likelihood of adoption of risk-management strategies than the level of association, particularly in less-developed environments. These findings are robust to a variety of socioeconomic and demographic characteristics and environmental contexts. Keywords: risk, social risk management, social capital, vulnerability
by Luis Flores Ballesteros.
M.C.P.
Washam, Ryan M. "Archaeology in Distress: Federal Land Management and Archaeological Vulnerability." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1406820452.
Full textLartey, Jerry. "Effective Vulnerability Management for Small Scale Organisations in Ghana." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75809.
Full textAfful-Dadzi, Anthony. "Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354126687.
Full textMakoka, Donald. "Risk, risk management and vulnerability to poverty in rural Malawi /." Göttingen : Cuvillier, 2008. http://d-nb.info/99080948X/04.
Full textBarrère, Cambrún Martín. "Vulnerability management for safe configurations in autonomic networks and systems." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0048/document.
Full textOver the last years, the massive deployment of computing devices over disparate interconnected infrastructures has dramatically increased the complexity of network management. Autonomic computing has emerged as a novel paradigm to cope with this challenging reality. By specifying high-level objectives, autonomic computing aims at delegating management activities to the networks themselves. However, when changes are performed by administrators and self-governed entities, vulnerable configurations may be unknowingly introduced. Nowadays, vulnerabilities constitute the main entry point for security attacks. Therefore, vulnerability management mechanisms are vital to ensure safe configurations, and with them, the survivability of any autonomic environment. This thesis targets the design and development of novel autonomous mechanisms for dealing with vulnerabilities, in order to increase the security of autonomic networks and systems. We first present a comprehensive state of the art in autonomic computing and vulnerability management. Afterwards, we present our contributions which include autonomic assessment strategies for device-based vulnerabilities and extensions in several dimensions, namely, distributed vulnerabilities (spatial), past hidden vulnerable states (temporal), and mobile security assessment (technological). In addition, we present vulnerability remediation approaches able to autonomously bring networks and systems into secure states. The scientific approaches presented in this thesis have been largely validated by an extensive set of experiments which are also discussed in this manuscript
Books on the topic "Vulnerability Management"
Alcira, Kreimer, and Munasinghe Mohan 1945-, eds. Environmental management and urban vulnerability. Washington, D.C: World Bank, 1992.
Find full textInternational Workshop on Deltas: Coastal Vulnerability and Management (2009 Anna University). Deltas: Coastal vulnerability and management. Edited by Ramesh R. (Ramachandran) and Anna University. Institute for Ocean Management. Chennai: Environmental Information System (ENVIS), 2009.
Find full textHardy, Brian. Innovations in community care management: Minimising vulnerability. Aldershot: Avebury, 1992.
Find full textBrian, Hardy. Innovations in community care management: Minimising vulnerability. Aldershot, England: Ashgate Publishing Co., 1992.
Find full textFurniss, Michael J., and Christopher P. Carlson. Assessing the vulnerability of watersheds to climate change: Results of national forest watershed vulnerability pilot assessments. Portland, OR: Pacific Northwest Research Station, 2013.
Find full textBook chapters on the topic "Vulnerability Management"
Thompson, Eric C. "Vulnerability Management." In Designing a HIPAA-Compliant Security Operations Center, 65–93. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5608-4_4.
Full textPompon, Raymond. "Vulnerability Management." In IT Security Risk Control Management, 165–74. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2140-2_14.
Full textWilliams, Branden R., and James K. Adamson. "Vulnerability Management." In PCI Compliance, 137–62. 5th ed. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003100300-9.
Full textSaile, K. N. D., and Phani Kumar Gajula. "Vulnerability Management." In Information Security and Optimization, 13–24. First edition. | Boca Raton : C&H\CRC Press, 2021.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-2.
Full textWilliams, Walter. "Vulnerability Management." In Creating an Information Security Program from Scratch, 99–106. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003093688-4.
Full textMadigan, Michael L. "Vulnerability." In Handbook of Emergency Management Concepts, 139–56. Boca Raton, FL : CRC Press, 2018.: CRC Press, 2017. http://dx.doi.org/10.1201/b22489-9.
Full textHaber, Morey J., and Brad Hibbert. "Vulnerability Management Design." In Asset Attack Vectors, 119–23. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_13.
Full textHaber, Morey J., and Brad Hibbert. "Vulnerability Management Development." In Asset Attack Vectors, 125–63. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_14.
Full textHaber, Morey J., and Brad Hibbert. "Vulnerability Management Deployment." In Asset Attack Vectors, 165–206. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_15.
Full textHaber, Morey J., and Brad Hibbert. "Vulnerability Management Operations." In Asset Attack Vectors, 207–12. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_16.
Full textConference papers on the topic "Vulnerability Management"
Farris, Katheryn A., John Sullivan, and George Cybenko. "Vulnerability survival analysis: a novel approach to vulnerability management." In SPIE Defense + Security, edited by Edward M. Carapezza. SPIE, 2017. http://dx.doi.org/10.1117/12.2266378.
Full textBhargav, A., and B. Vandana. "Exploring Tools For Vulnerability Management." In 2022 2nd Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2022. http://dx.doi.org/10.1109/asiancon55314.2022.9909072.
Full textAltaf, Insha, Firdous ul Rashid, Jawad Ahmad Dar, and Mohd Rafiq. "Vulnerability assessment and patching management." In 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI). IEEE, 2015. http://dx.doi.org/10.1109/icscti.2015.7489631.
Full textGuinet, Alain, and Roberto Faccincani. "Hospital's vulnerability assessment." In 2015 International Conference on Industrial Engineering and Systems Management (IESM). IEEE, 2015. http://dx.doi.org/10.1109/iesm.2015.7380166.
Full textKozlovszky, M., L. Kovacs, M. Torocsik, G. Windisch, S. Acs, D. Prem, Gy Eigner, P. I. Sas, T. Schubert, and V. Poserne. "Cloud security monitoring and vulnerability management." In 2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES). IEEE, 2013. http://dx.doi.org/10.1109/ines.2013.6632823.
Full textTian, H. T., L. S. Huang, Z. Zhou, and Y. L. Luo. "Arm up administrators: automated vulnerability management." In 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings. IEEE, 2004. http://dx.doi.org/10.1109/ispan.2004.1300542.
Full textYu, Yijun, Ligen Xu, Xin Wang, and Liansheng Wang. "Management of Single Point Vulnerability Components." In 18th International Conference on Nuclear Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/icone18-29738.
Full textShivani, T. J., Hegde Ramakrishna, and Nagraj Nagashree. "Vulnerability Management using Machine Learning Techniques." In 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2021. http://dx.doi.org/10.1109/icmnwc52512.2021.9688490.
Full textQian, Ying, Wanqing You, and Kai Qian. "FlowVisor vulnerability analysis." In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 2017. http://dx.doi.org/10.23919/inm.2017.7987387.
Full textMendoza, E. Tonatiuh, Elena Ojeda, Klaus J. Meyer-Arendt, Paulo Salles, and Christian M. Appendini. "Assessing Coastal Vulnerability in Yucatan (Mexico)." In 8th International Coastal Management Conference. ICE Publishing, 2016. http://dx.doi.org/10.1680/cm.61149.607.
Full textReports on the topic "Vulnerability Management"
Mell, P. M., T. Bergeron, and D. Henning. Creating a patch and vulnerability management program. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-40ver2.
Full textGundy, Roy, Tom House, Wayne Cockerell, and Scott Meade. Vulnerability management in manufacturing OT networks—are we playing whack-a-mole? BioPhorum, October 2023. http://dx.doi.org/10.46220/2023it007.
Full textLahr, Joost, Judith Klostermann, and Rob Smidt. Vulnerability of coastal species in Svalbard to selected stressors : sustainable Arctic Resource Management. Wageningen: Wageningen Environmental Research, 2019. http://dx.doi.org/10.18174/497750.
Full textKahal, E. J., S. L. Murphy, and S. R. Salaymeh. Savannah River Site management response plan for chemical safety vulnerability field assessment. Revision 1. Office of Scientific and Technical Information (OSTI), September 1994. http://dx.doi.org/10.2172/150902.
Full textUlloa, Fernando. Learning in Twenty-First Century Schools: Note 8: Disaster Risk Management in School Systems. Inter-American Development Bank, December 2014. http://dx.doi.org/10.18235/0006296.
Full textMcDowell Peek, Katie, Blair Tormey, Holli Thompson, Allan Ellsworth, and Cat Hawkins Hoffman. Climate change vulnerability assessments in the National Park Service: An integrated review for infrastructure, natural resources, and cultural resources. National Park Service, June 2022. http://dx.doi.org/10.36967/nrr-2293650.
Full textJourneay, M., J. Z. K. Yip, C. L. Wagner, P. LeSueur, and T. Hobbs. Social vulnerability to natural hazards in Canada. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/330295.
Full textVan Ackern, Pia, and Adrien Detges. Climate change, vulnerability and security in the Sahel. Adelphi research gemeinnützige GmbH, December 2022. http://dx.doi.org/10.55317/casc024.
Full textCardona, Omar D. Indicators of Disaster Risk and Risk Management. Inter-American Development Bank, July 2005. http://dx.doi.org/10.18235/0010537.
Full textDetges, Adrien, André Mueller, and Michelle Helene Reuter. Climate vulnerability and security in the Euphrates-Tigris Basin. Adelphi research gemeinnützige GmbH, June 2023. http://dx.doi.org/10.55317/casc026.
Full text