• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 747
Next 10 →

TABLE 1 Depiction of a population of adolescents

in ADOLESCENT RESILIENCE: AFramework for Understanding Healthy Development in the Face of Risk
by Stevenson Fergus, Marc A. Zimmerman 2004

Table 13 Intercorrelations for Adolescent Cognitive Skills, Extent of Adolescent Health Care Needs and Parent Satisfaction with Health Care Services

in unknown title
by unknown authors 2003
"... In PAGE 24: ...As Table13 indicates, children with lower cognitive skills tend to have greater health care needs. However, parent satisfaction with the health care services is unrelated to adolescent cognitive skills or health care needs.... ..."

Table 5 Vulnerability by type

in with vulnerability disclosure? An empirical analysis
by Ashish Arora, Rahul Telang, Kumar R. Telang, A. Nandkumar, R. Telang

Table 7: Vulnerability Properties

in A Structured Approach to Classifying Security Vulnerabilities
by Robert C. Seacord, Allen D. Householder 2005
"... In PAGE 28: ... As a result, the interesting properties of vulnerabilities are significantly different than the interest- ing properties of software flaws. Table7 enumerates these attributes and associated values. 2.... ..."

Table 3: Component Vulnerabilities.

in Complexity-Based Information Assurance
by Stephen F. Bush, S. C. Evans, Author(s S. F, Bush Phone, Stephen F Bush, Scott Evans 2001
"... In PAGE 19: ... However, notice the rate at which the complexity rises in each of the figures. From Table3 , it would appear that Component E is most vulnerable due to its low rate of increase in complexity while Component B appears to be the least vulnerable due to its steeper rise in complexity. These results make intuitive sense because Component E is simply transmitting data without any form of protection while Component B is adding noise to the data.... ..."
Cited by 1

Table 1: Vulnerabilities

in tions of processing fluency to repetition effects in Semantic effects in single-word naming. Journal of masked word identification
by Dong Yu, Deborah Frincke 2004
"... In PAGE 2: ... Analysis of Figure 1 yields several potential vulnerabilities. These vulnerabilities can be divided into the categories shown in Table1 . These categories are based both on vulnerabilities documented by other researchers [1,4,8] and those we postulate based on analysis of Figure 1.... In PAGE 3: ... As mentioned in Section 1, correct operation of an IDS involves interactions between several components, usage of sensor data collected from different locations, and interaction between the IDS and the OS. Controlling which components or processes are allowed to communicate with other components in the IDS, as well as which data can be trusted by the IDS is very important to mitigate several vulnerabilities indicated in Table1 , and other researchers have proposed a variety of ways to accomplish this. Onabuta et.... In PAGE 4: ...1. The DFFA Structure The SIDS architecture is based on a DFFA structure intended to mitigate vulnerabilities V1-4 of Table1 . An IDS is translated into SIDS as follows.... ..."
Cited by 1

Table 3 - Vulnerability by type

in Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis
by Ashish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang 2004
Cited by 5

Table 7: Approaches to vulnerability

in 2003a. Methods for microeconometric risk and vulnerability assessments
by The World Bank, John Hoddinott, John Hoddinott, Agnes Quisumbing, Agnes Quisumbing
Cited by 1

Table 7. Vulnerability Information

in unknown title
by unknown authors

Table 7: Vulnerability databases

in unknown title
by unknown authors
Next 10 →
Results 1 - 10 of 747
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University