181
Published 2000
OECD Publishing
...Circulation routière : la sécurité des usagers vulnérables...

182
Published 2014
Springer International Publishing
... of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13...

183
by Younus, Md Aboul Fazal
Published 2014
Springer Netherlands
Table of Contents: ... -- Crop Adjustment Processes to Extreme Floods -- Community-Based Vulnerability and Adaptation Assessment...

184
Published 2014
Springer Netherlands
...With the advance of biomedicine, certain individuals and groups are vulnerable because...

185
Published 1999
Springer Netherlands
Table of Contents: ... Resources Vulnerability to Climate Change With Special Reference to Inundation -- Climate Change...

186
Published 2016
Springer International Publishing
Table of Contents: ...Intrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques...

187
by Petrie, Murray
Published 2000
International Monetary Fund
...Fiscal vulnerability describes a situation where a government is exposed to the possibility...

189
by Schumacher, Liliana
Published 1998
International Monetary Fund
...A loss of solvency increases central bank vulnerability, reducing the credibility of commitments...

190
by McHugh, James
Published 2011
International Monetary Fund
... stress events. Two aggregate indices are calculated: an index of fiscal vulnerability and an index...

191
Published 2015
Springer International Publishing
Table of Contents: ... on African Cities -- 3. Vulnerability of Built Environment to Flooding in African Cities -- 4. Green...

192
Published 2015
Springer International Publishing
... of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17...

194
by Takáts, Elöd
Published 2009
International Monetary Fund
.... While the international downturn points to several vulnerabilities, the risks from the corporate...

195
by Setser, Brad
Published 2005
International Monetary Fund
... describes this so-called balance sheet approach and shows how it can be applied to detect vulnerabilities...

196
Published 2011
Springer Berlin Heidelberg
... of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July...

197
by Sobiech, Cilli
Published 2013
Springer Berlin Heidelberg
... at the dynamics of social vulnerability in the considered system of the Cerman North Sea Coast. Thus, the social...

199
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability...

200
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended...