Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Vulnerability

Discipline
Institution
Publication
Publication Type

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Ncer Assistance Agreement Annual Progress Report For Grant #83582401 - Assessment Of Stormwater Harvesting Via Manage Aquifer Recharge (Mar) To Develop New Water Supplies In The Arid West: The Salt Lake Valley Example, Ryan Dupont, Joan E. Mclean, Richard C. Peralta, Sarah E. Null, Douglas B. Jackson-Smith Nov 2017

Ncer Assistance Agreement Annual Progress Report For Grant #83582401 - Assessment Of Stormwater Harvesting Via Manage Aquifer Recharge (Mar) To Develop New Water Supplies In The Arid West: The Salt Lake Valley Example, Ryan Dupont, Joan E. Mclean, Richard C. Peralta, Sarah E. Null, Douglas B. Jackson-Smith

Civil and Environmental Engineering Faculty Publications

The aims of the original proposed project remain the same, that is, to test the hypothesis that Managed Aquifer Recharge (MAR) for stormwater harvesting is a technically feasible, socially and environmentally acceptable, economically viable, and legally feasible option for developing new water supplies for arid Western urban ecosystems experiencing increasing population, and climate change pressures on existing water resources. The project is being carried out via three distinct but integrated components that include: 1) Monitoring of existing distributed MAR harvesting schemes involving a growing number of demonstration Green Infrastructure (GI) test sites; 2) Integrated stormwater/vadose zone/groundwater/ ecosystem services modeling; and …


Comparing Urban And Rural Vulnerability To Heat-Related Mortality: A Systematic Review And Meta-Analysis, Ying Li, Emmanuel A. Odamne, Ken Silver, Shimin Zheng Oct 2017

Comparing Urban And Rural Vulnerability To Heat-Related Mortality: A Systematic Review And Meta-Analysis, Ying Li, Emmanuel A. Odamne, Ken Silver, Shimin Zheng

ETSU Faculty Works

Studies of the adverse impacts of high temperature on human health have primarily focused on urban areas, due in part to urban centers generally having higher population density and often being warmer than surrounding rural areas (the “urban heat island” effect). As a result, urban areas are often considered to be more vulnerable to summer heat. However, heat vulnerability may not only be determined by heat exposure, but also by other population characteristics such as age, education, income, baseline health status, and social isolation. These factors are likely to increase vulnerability among rural populations compared to urban populations. In this …


Methodology To Perform Cyber Lethality Assessment, Matthew W. Zurasky Oct 2017

Methodology To Perform Cyber Lethality Assessment, Matthew W. Zurasky

Engineering Management & Systems Engineering Theses & Dissertations

The Naval Surface Warfare Center, Dahlgren Division (NSWCDD) Lethality and Effectiveness Branch is the Navy’s subject matter experts (SME) on target vulnerability, weapon lethality, and weapon effectiveness. Branch personnel currently exercise expertise in the kinetic and directed energy weapon domains. When the Navy develops weapons in the kinetic and directed energy domains, there are clear and well established procedures and methodologies for performing target characterization that support weapon-target pairing. Algorithms exist to describe the likelihood of damage effects. It is natural that in the paradigm shift to cyberspace warfare that the Branch provide these same services to the warfighter in …


Joanaudit: A Tool For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand Sep 2017

Joanaudit: A Tool For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand

Research Collection School Of Computing and Information Systems

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form …


Major Hurricane Impact: Is Hampton Roads Ready?, Jon Cawley Sep 2017

Major Hurricane Impact: Is Hampton Roads Ready?, Jon Cawley

News Items

No abstract provided.


Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya Jun 2017

Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya

USF Tampa Graduate Theses and Dissertations

Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related studies. Vulnerability Life Cycle discussed by S. Frei and studies by several other scholars have noted the importance of this approach. Application of Statistical Methodologies in Cybersecurity related studies call for a greater deal of new information. Using currently available data from National Vulnerability Database this study develops and presents a set of useful Statistical tools to be applied in Cybersecurity related decision making processes.

In the present study, the concept of Vulnerability Space is defined as a probability space. Relevant theoretical analyses are conducted and …


Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi Jun 2017

Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi

USF Tampa Graduate Theses and Dissertations

Development of Cybersecurity processes and strategies should take two main approaches. One is to develop an efficient and effective set of methodologies to identify software vulnerabilities and patch them before being exploited. Second is to develop a set of methodologies to predict the behavior of attackers and execute defending techniques based on attacking behavior. Managing of Vulnerabilities and analyzing them is directly related to the first approach. Developing of methodologies and models to predict the behavior of attackers is related to the second approach. Both these approaches are inseparably interconnected. Our effort in this study mainly focuses on developing useful …


Financial Assessment Of Agricultural Lands At Risk To Coastal Salt Marsh Migration In Relation To Climate Change Induced Sea Level Rise In Dorchester County, Maryland, Jewell Porter May 2017

Financial Assessment Of Agricultural Lands At Risk To Coastal Salt Marsh Migration In Relation To Climate Change Induced Sea Level Rise In Dorchester County, Maryland, Jewell Porter

Sustainability and Social Justice

The increasing rate and effects of sea level rise is a major environmental concern in the Chesapeake Bay. This paper evaluates the impacts of rising sea level on coastal salt marshes and the surrounding agricultural lands at risk in Dorchester County, Maryland to build off existing environmental monitoring work performed by NOAA’s Sentinel Site Program. The results of the spatial analysis were used to estimate monetary benefits to incentivize farmers to protect these marshes by making their land available for marsh migration to occur. Looking at three scenarios of sea level rise and marsh migration, grain crops (corn, soybeans, and …


A Supply Chain Framework For Characterizing Indirect Vulnerability, Charlotte Kendra Z. Gotangco, Abigail Marie T. Favis, Ma. Aileen Leah G. Guzman, Marion Lara Tan, Carissa Quintana, Jairus Carmela C. Josol Mar 2017

A Supply Chain Framework For Characterizing Indirect Vulnerability, Charlotte Kendra Z. Gotangco, Abigail Marie T. Favis, Ma. Aileen Leah G. Guzman, Marion Lara Tan, Carissa Quintana, Jairus Carmela C. Josol

Environmental Science Faculty Publications

Purpose

Climate vulnerability assessments are often operationalized by the analysis of indicators defined by the spatial boundaries of the community under study. These, however, sometimes fail to capture interdependency among communities for basic resources. This paper aims to propose a framework for characterizing vulnerability caused by interdependency by adapting a supply chain lens.

Design/methodology/approach

The paper proposes a definition for “indirect vulnerability” that recognizes the transboundary and teleconnected nature of vulnerability arising from resource networks among cities and communities. A conceptual framework using a supply chain approach is presented for climate hazards in particular. This approach is then demonstrated through …


The Graduate Student Blues, Marion D. Cohen Feb 2017

The Graduate Student Blues, Marion D. Cohen

Journal of Humanistic Mathematics

This is a memoir about my rather unconventional path to a mathematics Ph.D. There were difficulties, due partly to university politics, partly to my youth and immaturity, and partly to the thesis material itself – it was, in the words of some of my fellow students, “not what’s being done now”. I had written the thesis entirely on my own, without help from my Master’s thesis advisor or any other professor at my school. This is not the usual procedure of course. Nobody in my department could understand the thesis or was willing to vouch for it. There followed three …


Security Slicing For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand Feb 2017

Security Slicing For Auditing Common Injection Vulnerabilities, Julian Thome, Lwin Khin Shar, Domenico Bianculli, Lionel Briand

Research Collection School Of Computing and Information Systems

Cross-site scripting and injection vulnerabilities are among the most common and serious security issues for Web applications. Although existing static analysis approaches can detect potential vulnerabilities in source code, they generate many false warnings and source-sink traces with irrelevant information, making their adoption impractical for security auditing. One suitable approach to support security auditing is to compute a program slice for each sink, which contains all the information required for security auditing. However, such slices are likely to contain a large amount of information that is irrelevant to security, thus raising scalability issues for security audits. In this paper, we …