Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Environmental Sciences (4)
- Computer Sciences (3)
- Ecology and Evolutionary Biology (2)
- Engineering (2)
- Environmental Health and Protection (2)
-
- Life Sciences (2)
- Mathematics (2)
- Natural Resources and Conservation (2)
- Statistics and Probability (2)
- Terrestrial and Aquatic Ecology (2)
- Arts and Humanities (1)
- Atmospheric Sciences (1)
- Business (1)
- Business Law, Public Responsibility, and Ethics (1)
- Civil and Environmental Engineering (1)
- Climate (1)
- Earth Sciences (1)
- Education (1)
- Environmental Indicators and Impact Assessment (1)
- Environmental Monitoring (1)
- Environmental Public Health (1)
- Environmental Studies (1)
- Finance and Financial Management (1)
- Geographic Information Sciences (1)
- Geography (1)
- Hydrology (1)
- Information Security (1)
- Medicine and Health Sciences (1)
- Oceanography and Atmospheric Sciences and Meteorology (1)
- Institution
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Physical Sciences and Mathematics
Ncer Assistance Agreement Annual Progress Report For Grant #83582401 - Assessment Of Stormwater Harvesting Via Manage Aquifer Recharge (Mar) To Develop New Water Supplies In The Arid West: The Salt Lake Valley Example, Ryan Dupont, Joan E. Mclean, Richard C. Peralta, Sarah E. Null, Douglas B. Jackson-Smith
Ncer Assistance Agreement Annual Progress Report For Grant #83582401 - Assessment Of Stormwater Harvesting Via Manage Aquifer Recharge (Mar) To Develop New Water Supplies In The Arid West: The Salt Lake Valley Example, Ryan Dupont, Joan E. Mclean, Richard C. Peralta, Sarah E. Null, Douglas B. Jackson-Smith
Civil and Environmental Engineering Faculty Publications
The aims of the original proposed project remain the same, that is, to test the hypothesis that Managed Aquifer Recharge (MAR) for stormwater harvesting is a technically feasible, socially and environmentally acceptable, economically viable, and legally feasible option for developing new water supplies for arid Western urban ecosystems experiencing increasing population, and climate change pressures on existing water resources. The project is being carried out via three distinct but integrated components that include: 1) Monitoring of existing distributed MAR harvesting schemes involving a growing number of demonstration Green Infrastructure (GI) test sites; 2) Integrated stormwater/vadose zone/groundwater/ ecosystem services modeling; and …
Comparing Urban And Rural Vulnerability To Heat-Related Mortality: A Systematic Review And Meta-Analysis, Ying Li, Emmanuel A. Odamne, Ken Silver, Shimin Zheng
Comparing Urban And Rural Vulnerability To Heat-Related Mortality: A Systematic Review And Meta-Analysis, Ying Li, Emmanuel A. Odamne, Ken Silver, Shimin Zheng
ETSU Faculty Works
Studies of the adverse impacts of high temperature on human health have primarily focused on urban areas, due in part to urban centers generally having higher population density and often being warmer than surrounding rural areas (the “urban heat island” effect). As a result, urban areas are often considered to be more vulnerable to summer heat. However, heat vulnerability may not only be determined by heat exposure, but also by other population characteristics such as age, education, income, baseline health status, and social isolation. These factors are likely to increase vulnerability among rural populations compared to urban populations. In this …
Methodology To Perform Cyber Lethality Assessment, Matthew W. Zurasky
Methodology To Perform Cyber Lethality Assessment, Matthew W. Zurasky
Engineering Management & Systems Engineering Theses & Dissertations
The Naval Surface Warfare Center, Dahlgren Division (NSWCDD) Lethality and Effectiveness Branch is the Navy’s subject matter experts (SME) on target vulnerability, weapon lethality, and weapon effectiveness. Branch personnel currently exercise expertise in the kinetic and directed energy weapon domains. When the Navy develops weapons in the kinetic and directed energy domains, there are clear and well established procedures and methodologies for performing target characterization that support weapon-target pairing. Algorithms exist to describe the likelihood of damage effects. It is natural that in the paradigm shift to cyberspace warfare that the Branch provide these same services to the warfighter in …
Joanaudit: A Tool For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand
Joanaudit: A Tool For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand
Research Collection School Of Computing and Information Systems
JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form …
Major Hurricane Impact: Is Hampton Roads Ready?, Jon Cawley
Major Hurricane Impact: Is Hampton Roads Ready?, Jon Cawley
News Items
No abstract provided.
Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya
Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya
USF Tampa Graduate Theses and Dissertations
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related studies. Vulnerability Life Cycle discussed by S. Frei and studies by several other scholars have noted the importance of this approach. Application of Statistical Methodologies in Cybersecurity related studies call for a greater deal of new information. Using currently available data from National Vulnerability Database this study develops and presents a set of useful Statistical tools to be applied in Cybersecurity related decision making processes.
In the present study, the concept of Vulnerability Space is defined as a probability space. Relevant theoretical analyses are conducted and …
Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi
Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi
USF Tampa Graduate Theses and Dissertations
Development of Cybersecurity processes and strategies should take two main approaches. One is to develop an efficient and effective set of methodologies to identify software vulnerabilities and patch them before being exploited. Second is to develop a set of methodologies to predict the behavior of attackers and execute defending techniques based on attacking behavior. Managing of Vulnerabilities and analyzing them is directly related to the first approach. Developing of methodologies and models to predict the behavior of attackers is related to the second approach. Both these approaches are inseparably interconnected. Our effort in this study mainly focuses on developing useful …
Financial Assessment Of Agricultural Lands At Risk To Coastal Salt Marsh Migration In Relation To Climate Change Induced Sea Level Rise In Dorchester County, Maryland, Jewell Porter
Sustainability and Social Justice
The increasing rate and effects of sea level rise is a major environmental concern in the Chesapeake Bay. This paper evaluates the impacts of rising sea level on coastal salt marshes and the surrounding agricultural lands at risk in Dorchester County, Maryland to build off existing environmental monitoring work performed by NOAA’s Sentinel Site Program. The results of the spatial analysis were used to estimate monetary benefits to incentivize farmers to protect these marshes by making their land available for marsh migration to occur. Looking at three scenarios of sea level rise and marsh migration, grain crops (corn, soybeans, and …
A Supply Chain Framework For Characterizing Indirect Vulnerability, Charlotte Kendra Z. Gotangco, Abigail Marie T. Favis, Ma. Aileen Leah G. Guzman, Marion Lara Tan, Carissa Quintana, Jairus Carmela C. Josol
A Supply Chain Framework For Characterizing Indirect Vulnerability, Charlotte Kendra Z. Gotangco, Abigail Marie T. Favis, Ma. Aileen Leah G. Guzman, Marion Lara Tan, Carissa Quintana, Jairus Carmela C. Josol
Environmental Science Faculty Publications
Purpose
Climate vulnerability assessments are often operationalized by the analysis of indicators defined by the spatial boundaries of the community under study. These, however, sometimes fail to capture interdependency among communities for basic resources. This paper aims to propose a framework for characterizing vulnerability caused by interdependency by adapting a supply chain lens.
Design/methodology/approach
The paper proposes a definition for “indirect vulnerability” that recognizes the transboundary and teleconnected nature of vulnerability arising from resource networks among cities and communities. A conceptual framework using a supply chain approach is presented for climate hazards in particular. This approach is then demonstrated through …
The Graduate Student Blues, Marion D. Cohen
The Graduate Student Blues, Marion D. Cohen
Journal of Humanistic Mathematics
This is a memoir about my rather unconventional path to a mathematics Ph.D. There were difficulties, due partly to university politics, partly to my youth and immaturity, and partly to the thesis material itself – it was, in the words of some of my fellow students, “not what’s being done now”. I had written the thesis entirely on my own, without help from my Master’s thesis advisor or any other professor at my school. This is not the usual procedure of course. Nobody in my department could understand the thesis or was willing to vouch for it. There followed three …
Security Slicing For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand
Security Slicing For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand
Research Collection School Of Computing and Information Systems
Cross-site scripting and injection vulnerabilities are among the most common and serious security issues for Web applications. Although existing static analysis approaches can detect potential vulnerabilities in source code, they generate many false warnings and source-sink traces with irrelevant information, making their adoption impractical for security auditing. One suitable approach to support security auditing is to compute a program slice for each sink, which contains all the information required for security auditing. However, such slices are likely to contain a large amount of information that is irrelevant to security, thus raising scalability issues for security audits. In this paper, we …