Journal articles on the topic 'Vulnerability Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Vulnerability Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ozyurt, Gulizar, Aysen Ergin, and Cuneyt Baykal. "COASTAL VULNERABILITY ASSESSMENT TO SEA LEVEL RISE INTEGRATED WITH ANALYTICAL HIERARCHY PROCESS." Coastal Engineering Proceedings 1, no. 32 (January 29, 2011): 6. http://dx.doi.org/10.9753/icce.v32.management.6.
Full textSancho, Francisco, Filipa S. B. F. Oliveira, and Paula Freire. "COASTAL DUNES VULNERABILITY INDEXES: A NEW PROPOSAL." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 68. http://dx.doi.org/10.9753/icce.v33.management.68.
Full textPosada-Vanegas, Gregorio, Gerardo Durán-Valdez, Rodolfo Silva-Casarin, Maria Elena Maya-Magaña, and Jose Antonio Salinas-Prieto. "VULNERABILITY TO COASTAL FLOODING INDUCED BY TROPICAL CYCLONES." Coastal Engineering Proceedings 1, no. 32 (January 31, 2011): 19. http://dx.doi.org/10.9753/icce.v32.management.19.
Full textNarayan, Siddharth, Robert J. Nicholls, Ekaterina Trifonova, Mariana Filipova – Marinova, Iliyan Kotsev, Stoyan Vergiev, Susan Hanson, and Derek Clarke. "COASTAL HABITATS WITHIN FLOOD RISK ASSESSMENTS: ROLE OF THE 2D SPR APPROACH." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 12. http://dx.doi.org/10.9753/icce.v33.management.12.
Full textAleksic, Aleksandar, Hrvoje Puskaric, Danijela Tadic, and Miladin Stefanovic. "Project management issues: vulnerability management assessment." Kybernetes 46, no. 7 (August 7, 2017): 1171–88. http://dx.doi.org/10.1108/k-08-2016-0218.
Full textOkuda, Takeshi, and Suguru Yamaguchi. "Lightweight Vulnerability Management System." Journal of Information Processing 16 (2008): 157–64. http://dx.doi.org/10.2197/ipsjjip.16.157.
Full textHardin, Eric, Helena Mitasova, and Margery Overton. "GIS-BASED ANALYSIS OF STORM VULNERABILITY CHANGE AT PEA ISLAND, NC." Coastal Engineering Proceedings 1, no. 33 (December 15, 2012): 75. http://dx.doi.org/10.9753/icce.v33.management.75.
Full textWalkowski, Michał, Jacek Oko, and Sławomir Sujecki. "Vulnerability Management Models Using a Common Vulnerability Scoring System." Applied Sciences 11, no. 18 (September 19, 2021): 8735. http://dx.doi.org/10.3390/app11188735.
Full textPodsevalov, Artem G., and Mikhail I. Kudinov. "Issues of using vulnerability prioritization algorithms when organizing the vulnerability management process." Digital technology security, no. 1 (March 26, 2024): 52–73. http://dx.doi.org/10.17212/2782-2230-2024-1-52-73.
Full textHaerens, Piet, Paolo Ciavola, Óscar Ferreira, Ap Van Dongeren, Mark Van Koningsveld, and Annelies Bolle. "ONLINE OPERATIONAL EARLY WARNING SYSTEM PROTOTYPES TO FORECAST COASTAL STORM IMPACTS (CEWS)." Coastal Engineering Proceedings 1, no. 33 (October 25, 2012): 45. http://dx.doi.org/10.9753/icce.v33.management.45.
Full textAndreeva, Nataliya Kamenova, Nikolay Valchev, Bogdan Prodanov, Petya Eftimova, Iliyan Kotsev, and Lyubomir Dimitrov. "ASSESSMENT OF COASTAL RECEPTORS’ EXPOSURE VULNERABILITY TO FLOOD HAZARD ALONG VARNA REGIONAL COAST." Coastal Engineering Proceedings, no. 35 (June 23, 2017): 8. http://dx.doi.org/10.9753/icce.v35.management.8.
Full textMerrell, Samuel A., and James F. Stevens. "Improving the Vulnerability Management Process." EDPACS 38, no. 1 (June 24, 2008): 13–22. http://dx.doi.org/10.1080/07366980802138673.
Full textSteinberger, Richard. "Vulnerability Management in Unix Environments." Information Security Technical Report 7, no. 1 (March 2002): 26–36. http://dx.doi.org/10.1016/s1363-4127(02)00104-8.
Full textArce, Iván. "Vulnerability management at the crossroads." Network Security 2008, no. 5 (May 2008): 11–13. http://dx.doi.org/10.1016/s1353-4858(08)70064-3.
Full textPercebois, Jacques. "Energy vulnerability and its management." International Journal of Energy Sector Management 1, no. 1 (January 23, 2007): 51–62. http://dx.doi.org/10.1108/17506220710738597.
Full textSano, Marcello, Scott Baum, Marcus Bussey, RW Bill Carter, Florence Crick, Aliasghar Golshani, Darryl Low Choy, et al. "ADAPTING COASTS TO CLIMATIC FUTURES. AN AUSTRALIAN PERSPECTIVE." Coastal Engineering Proceedings 1, no. 33 (December 14, 2012): 21. http://dx.doi.org/10.9753/icce.v33.management.21.
Full textMohamad, Mohd Fauzi, Lee Hin Lee, and Mohd Kamarul Huda Samion. "Coastal Vulnerability Assessment towards Sustainable Management of Peninsular Malaysia Coastline." International Journal of Environmental Science and Development 5, no. 6 (2014): 533–38. http://dx.doi.org/10.7763/ijesd.2014.v5.540.
Full textPoddubnyi, V. O., and O. V. Severinov. "Vulnerability management using a formalized description." Radiotekhnika, no. 203 (December 23, 2020): 121–25. http://dx.doi.org/10.30837/rt.2020.4.203.11.
Full textDavidovac, Zoran, and Vanja Korać. "Vulnerability Management and Patching IT Systems." Arheologija i prirodne nauke 6 (2010): 271–86. http://dx.doi.org/10.18485/arhe_apn.2010.6.16.
Full textPapadaki, Maria, and Steven Furnell. "Vulnerability management: an attitude of mind?" Network Security 2010, no. 10 (October 2010): 4–8. http://dx.doi.org/10.1016/s1353-4858(10)70124-0.
Full textGupta, Alok. "Vulnerability and Disaster Management in India." Prehospital and Disaster Medicine 15, S2 (September 2000): S98. http://dx.doi.org/10.1017/s1049023x00032246.
Full textSapountzaki, Kalliopi. "Vulnerability management by means of resilience." Natural Hazards 60, no. 3 (August 14, 2011): 1267–85. http://dx.doi.org/10.1007/s11069-011-9908-3.
Full textJohnson, Sheri L., Coral Ballister, and Thomas E. Joiner. "Hypomanic vulnerability, terror management, and materialism." Personality and Individual Differences 38, no. 2 (January 2005): 287–96. http://dx.doi.org/10.1016/j.paid.2004.04.008.
Full textSan Cristóbal Ruiz, Elio, Rafael Pastor Vargas, Rosario Gil Ortego, Russ Meier, Hamadou Saliah-Hassane, and Manuel Castro. "Vulnerability Assessment of Learning Management Systems." IT Professional 25, no. 1 (January 2023): 60–67. http://dx.doi.org/10.1109/mitp.2022.3204640.
Full textAnand, Adarsh, Navneet Bhatt, and Deepti Aggrawal. "Modeling Software Patch Management Based on Vulnerabilities Discovered." International Journal of Reliability, Quality and Safety Engineering 27, no. 02 (September 13, 2019): 2040003. http://dx.doi.org/10.1142/s0218539320400033.
Full textForman, Harriet, and Frank S. Merrick. "Vulnerability Audits." JONA: The Journal of Nursing Administration 32, no. 10 (October 2002): 495–97. http://dx.doi.org/10.1097/00005110-200210000-00002.
Full textChirenda, Tatenda Grace, Roman Tandlich, Viwe Krele, Catherine Diane Luyt, Chandra Sunitha Srinivas, and Chidinma Uche Iheanetu. "Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe." Information & Security: An International Journal 40, no. 1 (2018): 61–91. http://dx.doi.org/10.11610/isij.4005.
Full textEichner, Thomas. "Mean Variance Vulnerability." Management Science 54, no. 3 (March 2008): 586–93. http://dx.doi.org/10.1287/mnsc.1070.0772.
Full textBrombacher, Aarnout. "Vulnerability." Quality and Reliability Engineering International 27, no. 1 (January 27, 2011): 1. http://dx.doi.org/10.1002/qre.1186.
Full textOktaviana, Milenia, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Vulnerability Management Pada Container Docker Menggunakan Opensource Scanner Berdasarkan Standar Cyber Resilience Review (CRR)." Jurnal Sistem Komputer dan Informatika (JSON) 4, no. 1 (September 30, 2022): 77. http://dx.doi.org/10.30865/json.v4i1.4787.
Full textAlam, Shaz, and Mohd Muqeem. "Modular responsibility distribution for vulnerability management process." International Journal of Advanced Technology and Engineering Exploration 5, no. 48 (November 21, 2018): 469–72. http://dx.doi.org/10.19101/ijatee.2018.c02.
Full textKanakoudis, V. K. "Vulnerability based management of water resources systems." Journal of Hydroinformatics 6, no. 2 (March 1, 2004): 133–56. http://dx.doi.org/10.2166/hydro.2004.0012.
Full textSzewrański, Szymon, and Jan K. Kazak. "Socio-Environmental Vulnerability Assessment for Sustainable Management." Sustainability 12, no. 19 (September 24, 2020): 7906. http://dx.doi.org/10.3390/su12197906.
Full textVesper, Dorothy J. "Water in Karst: Management, Vulnerability, and Restoration." Groundwater 51, no. 5 (August 2, 2013): 656. http://dx.doi.org/10.1111/gwat.12094.
Full textAgarwal, Jitendra. "Improving resilience through vulnerability assessment and management." Civil Engineering and Environmental Systems 32, no. 1-2 (April 3, 2015): 5–17. http://dx.doi.org/10.1080/10286608.2015.1025065.
Full textLim, Mieng. "Avoiding the most common vulnerability-management pitfalls." Network Security 2020, no. 7 (July 2020): 12–14. http://dx.doi.org/10.1016/s1353-4858(20)30080-5.
Full textErmoliev, Y., T. Ermolieva, G. Fischer, M. Makowski, S. Nilsson, and M. Obersteiner. "Discounting, catastrophic risks management and vulnerability modeling." Mathematics and Computers in Simulation 79, no. 4 (December 2008): 917–24. http://dx.doi.org/10.1016/j.matcom.2008.02.004.
Full textGray, Andy. "An historical perspective of software vulnerability management." Information Security Technical Report 8, no. 4 (April 2003): 34–44. http://dx.doi.org/10.1016/s1363-4127(03)00005-0.
Full textForte, Dario. "Vulnerability Management: One Problem, Several Potential Approaches." Network Security 2002, no. 5 (May 2002): 11–13. http://dx.doi.org/10.1016/s1353-4858(02)05013-4.
Full textArce, Ivan. "Vulnerability management at the crossroads, part 2." Network Security 2008, no. 6 (June 2008): 9–12. http://dx.doi.org/10.1016/s1353-4858(08)70076-x.
Full textGeng, Yangyang, Rongkuan Ma, Qiang Wei, and Wenhai Wang. "Programmable logic controller memory management vulnerability analysis." Journal of Physics: Conference Series 2414, no. 1 (December 1, 2022): 012015. http://dx.doi.org/10.1088/1742-6596/2414/1/012015.
Full textĆosić, Đorđe, Srđan Popov, Dušan Sakulski, Ana Pavlović, and Dunja Palić. "Importance of Vulnerability in Disaster Risk Management." International Journal of Industrial Engineering and Management 2, no. 2 (June 30, 2011): 51–60. http://dx.doi.org/10.24867/ijiem-2011-2-108.
Full textAnidah, Risa Rosita, and Riana Hartati. "Environment Vulnerability Decision Technology (EVDT) Mangrove Management." BIODIVERS - BIOTROP Science Magazine 1, no. 1 (January 31, 2022): 23–26. http://dx.doi.org/10.56060/bdv.2022.1.1.1970.
Full textNyanchama, Matunda. "Enterprise Vulnerability Management and Its Role in Information Security Management." Information Systems Security 14, no. 3 (July 2005): 29–56. http://dx.doi.org/10.1201/1086.1065898x/45390.14.3.20050701/89149.6.
Full textMugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." International Journal of Information Systems for Crisis Response and Management 10, no. 2 (April 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.
Full textYunita, Desi, Nunung Nurwati, Wahyu Gunawan, and Azlinda Azman. "The Vulnerability Model of Water Resources Management in Forest Edge Communities in Sumedang Regency." Journal of Law and Sustainable Development 12, no. 1 (January 29, 2024): e2879. http://dx.doi.org/10.55908/sdgs.v12i1.2879.
Full textNugraha, Gumilar Utamas, Karit Lumban Gaol, Priyo Hartanto, and Hendra Bakti. "Aquifer Vulnerability: Its Protection and Management—A Case Study in Pangkalpinang City, Indonesia." International Journal of Geophysics 2020 (December 29, 2020): 1–23. http://dx.doi.org/10.1155/2020/8887914.
Full textTatekoji, Akifumi, Ryota Nakamura, and Tomoya Shibayama. "INFLUENCE OF HISTORICAL BATHYMETRIC CHANGES DUE TO URBANIZATION ON THE VULNERABILITY OF STORM SURGE IN TOKYO BAY." Coastal Engineering Proceedings, no. 35 (June 23, 2017): 22. http://dx.doi.org/10.9753/icce.v35.management.22.
Full textGavidia, Jorge, and Annalisa Crivellari. "Legislation as Vulnerability Factor." Open House International 31, no. 1 (March 1, 2006): 84–89. http://dx.doi.org/10.1108/ohi-01-2006-b0010.
Full textHuang, Bo. "The Design of Information System Vulnerability Management Software Based on CVSS." Applied Mechanics and Materials 378 (August 2013): 499–503. http://dx.doi.org/10.4028/www.scientific.net/amm.378.499.
Full text