Sökning: "Vulnerability analysis"
Visar resultat 6 - 10 av 257 avhandlingar innehållade orden Vulnerability analysis.
6. Large-Scale Road Network Vulnerability Analysis
Sammanfattning : Disruptions in the transport system can have severe impacts for affected individuals, businesses and the society as a whole. In this research, vulnerability is seen as the risk of unplanned system disruptions, with a focus on large, rare events. LÄS MER
7. The politics of undocumented migrant childhoods : Agency, rights, vulnerability
Sammanfattning : In this thesis, I investigate the paradoxical characteristics of political struggles that take place in relation to undocumented migrant childhoods. Drawing on ethnographic research in Birmingham, UK and Malmö, Sweden between 2014 and 2017, I take as my starting point the everyday life experiences of children and families who have experienced living under an immanent risk of deportation. LÄS MER
8. Vulnerability and Power : Social Justice Organizing in Rockaway, New York City, after Hurricane Sandy
Sammanfattning : This is a study about disasters, vulnerability and power. With regards to social justice organizing a particular research problem guides the work, specifically that emancipatory projects are often initiated and steered by privileged actors who do not belong to the marginalized communities they wish to strengthen, yet the work is based on the belief that empowerment requires self-organizing from within. LÄS MER
9. Automated static code analysis : A tool for early vulnerability detection
Sammanfattning : Software vulnerabilities are added into programs during its development. Architectural flaws are introduced during planning and design, while implementation faults are created during coding. Penetration testing is often used to detect these vulnerabilities. LÄS MER
10. Observations on Operating System Security Vulnerabilities
Sammanfattning : This thesis presents research on computer security vulnerabilities in general-purpose operating systems. The objective is to investigate intrusions in such systems in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. LÄS MER