Results 1 - 10
of
747
TABLE 1 Depiction of a population of adolescents
2004
Table 13 Intercorrelations for Adolescent Cognitive Skills, Extent of Adolescent Health Care Needs and Parent Satisfaction with Health Care Services
2003
"... In PAGE 24: ...As Table13 indicates, children with lower cognitive skills tend to have greater health care needs. However, parent satisfaction with the health care services is unrelated to adolescent cognitive skills or health care needs.... ..."
Table 7: Vulnerability Properties
2005
"... In PAGE 28: ... As a result, the interesting properties of vulnerabilities are significantly different than the interest- ing properties of software flaws. Table7 enumerates these attributes and associated values. 2.... ..."
Table 3: Component Vulnerabilities.
2001
"... In PAGE 19: ... However, notice the rate at which the complexity rises in each of the figures. From Table3 , it would appear that Component E is most vulnerable due to its low rate of increase in complexity while Component B appears to be the least vulnerable due to its steeper rise in complexity. These results make intuitive sense because Component E is simply transmitting data without any form of protection while Component B is adding noise to the data.... ..."
Cited by 1
Table 1: Vulnerabilities
2004
"... In PAGE 2: ... Analysis of Figure 1 yields several potential vulnerabilities. These vulnerabilities can be divided into the categories shown in Table1 . These categories are based both on vulnerabilities documented by other researchers [1,4,8] and those we postulate based on analysis of Figure 1.... In PAGE 3: ... As mentioned in Section 1, correct operation of an IDS involves interactions between several components, usage of sensor data collected from different locations, and interaction between the IDS and the OS. Controlling which components or processes are allowed to communicate with other components in the IDS, as well as which data can be trusted by the IDS is very important to mitigate several vulnerabilities indicated in Table1 , and other researchers have proposed a variety of ways to accomplish this. Onabuta et.... In PAGE 4: ...1. The DFFA Structure The SIDS architecture is based on a DFFA structure intended to mitigate vulnerabilities V1-4 of Table1 . An IDS is translated into SIDS as follows.... ..."
Cited by 1
Table 3 - Vulnerability by type
2004
Cited by 5
Table 7: Approaches to vulnerability
Cited by 1
Results 1 - 10
of
747