scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "PSYCHOLOGICAL vulnerability"

1 - 10 of 11,368 results for
 "PSYCHOLOGICAL vulnerability"
Results per page:

ÜNİVERSİTE ÖĞRENCİLERİNİN PSİKOLOJİK İYİ OLUŞ DÜZEYLERİNİN YORDANMASINDA ÖZ-DÜZENLEME VE PSİKOLOJİK KIRILGANLIĞIN ROLÜ.

Publication Type: Academic Journal

Source(s): Electronic Journal of Social Sciences. Oct2022, Vol. 21 Issue 84, p1446-1464. 19p.

Abstract: Bu araştırmanın amacı, üniversite öğrencilerinin psikolojik iyi oluş düzeylerinin yordanmasında, algılanan öz düzenleme ve psikolojik kırılganlık değişkenlerinin etkisinin incelenmesidir. Belirlenen amaç doğrultusunda bu üç değişkenin; öğrenim görülen ...

View details

Coupled-Map-Lattices-Based Vulnerability Assessment of UAV Network in Interference Scenarios.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 10/21/2022, Vol. 2022, p1-14. 14p.

Abstract: On the modern information battlefield, UAV have been widely used due to the advantages of no casualties and good maneuverability. However, during the UAV swarm combat, the UAV network will be interfered by the enemy, which will damage some key UAV node...

View details

Code Vulnerability Detection Based on Deep Sequence and Graph Models: A Survey.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 10/14/2022, p1-11. 11p.

Abstract: With the flourishing of the open-source software community, the problem of software vulnerabilities is becoming more and more serious. Hence, it is urgent to come up with an effective and efficient code vulnerability detection method. Source code vulne...

View details

An Effective Node-To-Edge Interdependent Network and Vulnerability Analysis for Digital Coupled Power Grids.

Publication Type: Academic Journal

Source(s): International Transactions on Electrical Energy Systems. 9/29/2022, p1-13. 13p.

Abstract: With the deep coupling between the cyber side and the physical side of power systems, the failure of any link of both sides may lead to power outages, so it is necessary to analyze their vulnerability and vulnerable links for targeted improvement of sy...

View details

METRIC DIMENSION VULNERABILITY IN TREES UNDER EDGE CONTRACTION.

Publication Type: Academic Journal

Source(s): Palestine Journal of Mathematics. 2022, Vol. 11 Issue 3, p249-254. 6p.

Abstract: For a simple connected graph G = (V (G), E(G)) where V (G) is the set of vertices and E(G) is the edge set, the distance between two vertices u and v denoted by dG(u, v) or simply d(u, v) is the minimum number of edges between u and v. A vertex x resol...

View details

Seismic Vulnerability Analysis of Prefabricated Concrete Frame with a Cam-Type Response Amplifying Device of Viscous Damper.

Publication Type: Academic Journal

Source(s): Advances in Civil Engineering. 8/31/2022, p1-12. 12p.

Abstract: A new type of limit response amplifying device (cam-type response amplifying device) was proposed in order to be able to solve the shortcomings of the seismic performance of the prefabricated concrete structures and the shortcomings of the existing res...

View details

EtherFuzz: Mutation Fuzzing Smart Contracts for TOD Vulnerability Detection.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 8/26/2022, p1-8. 8p.

Abstract: With the development of Internet of Things technology, the use of Internet of Things is expanding, and its security risk will become an important factor restricting the development of Internet of Things technology. The application of blockchain technol...

View details

Research on Software Vulnerability Detection Method Based on Improved CNN Model.

Publication Type: Academic Journal

Source(s): Scientific Programming. 7/12/2022, p1-8. 8p.

Authors:

Abstract: A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software, extract the characteristics from the static code by using the program slicing technology, establish...

View details

GIS with Fuzzy Clustering Method for the Classification of Road Network Vulnerability.

Publication Type: Academic Journal

Source(s): Jordan Journal of Civil Engineering. 2022, Vol. 16 Issue 3, p381-392. 12p.

Abstract: Efficiency measures in a network focus on the assessment of the vulnerability of the road network in its different forms and about its classification, which is very little studied. In the absence of specific criteria for road vulnerability assessment r...

View details

Analysis of the vulnerability of tourism and leisure to jellyfish swarms on the eastern Costa del Sol. A multiscalar and multi-temporal perspective.

Publication Type: Academic Journal

Source(s): Revista de Estudios Andaluces. jul2022, Issue 44, p8-31. 24p.

Abstract: Se expone una metodología que permite determinar la vulnerabilidad de la actividad humana en las playas causada por la llegada de medusas. La zona piloto de análisis se corresponde con el área costera de Vélez Málaga (Málaga), en las playas de Torre de...

View details
sponsored