Skip Content
You are currently on the new version of our website. Access the old version .

1,114 Results Found

  • Article
  • Open Access
4 Citations
3,970 Views
26 Pages

Vulnerability and Attack Repository for IoT: Addressing Challenges and Opportunities in Internet of Things Vulnerability Databases

  • Anna Felkner,
  • Jan Adamski,
  • Jakub Koman,
  • Marcin Rytel,
  • Marek Janiszewski,
  • Piotr Lewandowski,
  • Rafał Pachnia and
  • Wojciech Nowakowski

14 November 2024

The article’s primary purpose is to highlight the importance of cybersecurity for Internet of Things (IoT) devices. Due to the widespread use of such devices in everyone’s daily and professional lives, taking care of their security is ess...

  • Article
  • Open Access
19 Citations
4,027 Views
34 Pages

Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things

  • Marek Janiszewski,
  • Anna Felkner,
  • Piotr Lewandowski,
  • Marcin Rytel and
  • Hubert Romanowski

25 June 2021

The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which r...

  • Article
  • Open Access
11 Citations
8,170 Views
18 Pages

A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

  • Ye Yuan,
  • Yuliang Lu,
  • Kailong Zhu,
  • Hui Huang,
  • Lu Yu and
  • Jiazhen Zhao

27 October 2023

Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that...

  • Data Descriptor
  • Open Access
4,003 Views
12 Pages

3 November 2018

The current economical recovery is driven by expansions in many countries, with a global economic growth of 3.6% in 2017. However, some countries are still struggling with vulnerable forms of employment and high unemployment rates. Official statistic...

  • Article
  • Open Access
31 Citations
6,461 Views
24 Pages

Development of Seismic Vulnerability and Exposure Models—A Case Study of Croatia

  • Gordana Pavić,
  • Marijana Hadzima-Nyarko,
  • Borko Bulajić and
  • Željka Jurković

29 January 2020

Assessing earthquake risk and building vulnerability requires an exposure model. These exposure models quantify the building stock in terms of structural characteristics, spatial location, and occupancy. The most significant exposure parameters are t...

  • Article
  • Open Access
6 Citations
3,409 Views
23 Pages

15 February 2023

Database Management Systems (DBMSs) are the core of management information systems. Thus, detecting security bugs or vulnerabilities of DBMSs is an essential task. In recent years, grey-box fuzzing has been adopted to detect DBMS bugs for its high ef...

  • Article
  • Open Access
15 Citations
4,780 Views
26 Pages

31 December 2024

The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. Traditional Web Application Firewalls (WAFs) often fail to keep p...

  • Article
  • Open Access
570 Views
33 Pages

29 December 2025

Historic city centers are characterized by dense and heterogeneous built environments, making them particularly vulnerable to the compound effects of seismic, flood, and landslide hazards. In this context, information required for vulnerability and r...

  • Article
  • Open Access
4 Citations
4,417 Views
22 Pages

Using Nighttime Light Data to Explore the Extent of Power Outages in the Florida Panhandle after 2018 Hurricane Michael

  • Diana Mitsova,
  • Yanmei Li,
  • Ross Einsteder,
  • Tiffany Roberts Briggs,
  • Alka Sapat and
  • Ann-Margaret Esnard

15 July 2024

The destructive forces of tropical cyclones can have significant impacts on the land, contributing to degradation through various mechanisms such as erosion, debris, loss of vegetation, and widespread damage to infrastructure. Storm surge and floodin...

  • Article
  • Open Access
1 Citations
2,785 Views
16 Pages

25 October 2023

Depopulation is occurring in rural areas of Japan due to the outflow of the population to urban areas, the declining birthrate, and the aging population. Within depopulated areas, there is a problem of declining accessibility to medical facilities du...

  • Article
  • Open Access
3 Citations
2,528 Views
30 Pages

5 June 2025

The increasing complexity of data ecosystems demands advanced methodologies for systematic privacy risk assessment. This work introduces two complementary metrics—the privacy risk expansion factor (PREF) and the privacy exposure index (PEI)&mda...

  • Article
  • Open Access
10 Citations
5,300 Views
16 Pages

Efficient Algorithm for Providing Live Vulnerability Assessment in Corporate Network Environment

  • Michał Walkowski,
  • Maciej Krakowiak,
  • Jacek Oko and
  • Sławomir Sujecki

9 November 2020

The time gap between public announcement of a vulnerability—its detection and reporting to stakeholders—is an important factor for cybersecurity of corporate networks. A large delay preceding an elimination of a critical vulnerability pre...

  • Article
  • Open Access
4 Citations
2,634 Views
13 Pages

16 February 2023

The characterisation of the seismic vulnerability of historical constructions represents a complex problem in which the typological variability, the difficulty of performing reliable large-scale assessments and dealing with a large database all play...

  • Article
  • Open Access
657 Views
20 Pages

Virtual City Simulator: A Scenario-Based Tool for Multidimensional Urban Flood Long-Term Vulnerability Assessment and Planning in Mediterranean Cities

  • Ana Noemí Gomez Vaca,
  • Lucía Alexandra Popartan,
  • Guillem Armengol Selvas,
  • Sergi Nuss-Girona,
  • Morgan Abily and
  • Ignasi Rodríguez-Roda

13 December 2025

Cities are increasingly vulnerable to flooding due to rapid urbanization and climate change, especially in Mediterranean climates. Although hydroinformatics, numerical modeling, and artificial intelligence can simulate and predict floods with high ac...

  • Article
  • Open Access
28 Citations
6,772 Views
26 Pages

22 October 2020

The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, whi...

  • Article
  • Open Access
2 Citations
3,373 Views
24 Pages

Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets

  • Ioannis Tsantilis,
  • Thomas K. Dasaklis,
  • Christos Douligeris and
  • Constantinos Patsakis

Cybersecurity is a never-ending battle against attackers, who try to identify and exploit misconfigurations and software vulnerabilities before being patched. In this ongoing conflict, it is important to analyse the properties of the vulnerability ti...

  • Review
  • Open Access
15 Citations
25,424 Views
56 Pages

A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

  • Khalid Bennouk,
  • Nawal Ait Aali,
  • Younès El Bouzekri El Idrissi,
  • Bechir Sebai,
  • Abou Zakaria Faroukhi and
  • Dorra Mahouachi

7 October 2024

The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack v...

  • Article
  • Open Access
2 Citations
5,298 Views
23 Pages

Modern database systems are critical for storing sensitive information but are increasingly targeted by cyber threats, including SQL injection (SQLi) attacks. This research proposes a robust security framework leveraging Docker-based virtualisation t...

  • Article
  • Open Access
3 Citations
3,120 Views
24 Pages

Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model

  • Vitalii Yesin,
  • Mikolaj Karpinski,
  • Maryna Yesina,
  • Vladyslav Vilihura and
  • Stanislaw A. Rajba

25 November 2021

Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured. To solve this challenge, the authors of the pa...

  • Article
  • Open Access
31 Citations
5,546 Views
35 Pages

2 February 2023

The complexity of historical urban centres progressively needs a strategic improvement in methods and the scale of knowledge concerning the vulnerability aspect of seismic risk. A geographical multi-scale point of view is increasingly preferred in th...

  • Article
  • Open Access
11 Citations
4,334 Views
17 Pages

20 June 2021

Successful cyber-attacks are caused by the exploitation of some vulnerabilities in the software and/or hardware that exist in systems deployed in premises or the cloud. Although hundreds of vulnerabilities are discovered every year, only a small frac...

  • Article
  • Open Access
9 Citations
4,350 Views
14 Pages

Evaluation of Regional Vulnerability to Disasters by People of Ishikawa, Japan: A Cross Sectional Study Using National Health Insurance Data

  • Makoto Fujiu,
  • Yuma Morisaki,
  • Junichi Takayama,
  • Kiyoko Yanagihara,
  • Tatsuya Nishino,
  • Masahiko Sagae and
  • Kohei Hirako

The 2013 Partial Amendment of the Disaster Countermeasures Basic Law mandated that a roster of vulnerable persons during disasters be created, and further development of evacuation support is expected. In this study, the number of vulnerable people l...

  • Review
  • Open Access
1,754 Views
28 Pages

14 August 2025

The Adriatic–Ionian region is seismically very active and poses a major challenge for risk mitigation. Each country has developed laws, standards, and techniques to reduce seismic vulnerability. The ADRISEISMIC project created a database of exi...

  • Article
  • Open Access
1 Citations
2,482 Views
11 Pages

Trends in Hospitalization and Mortality from Cervical Cancer in Brazil Are Linked to Socioeconomic and Care Indicators

  • Luiz Vinicius de Alcantara Sousa,
  • Laércio da Silva Paiva,
  • Stefanie de Sousa Antunes Alcantara,
  • Fernando Luiz Affonso Fonseca,
  • Luis Eduardo Werneck de Carvalho and
  • Fernando Adami

9 September 2022

We aimed, through an ecological survey of cervical cancer outcomes in Brazil, to analyze the influence of socioeconomic and care indicators of social vulnerability. The study sample (2010–2015) is composed of women diagnosed with cervical cance...

  • Article
  • Open Access
8 Citations
3,798 Views
19 Pages

28 April 2024

The emergence of security vulnerabilities and risks in software development assisted by self-generated tools, particularly with regard to the generation of code that lacks due consideration of security measures, could have significant consequences fo...

  • Article
  • Open Access
7 Citations
3,351 Views
24 Pages

5 March 2023

Urban settlements located in high-seismicity areas should benefit from comprehensive vulnerability analyses, which are essential for the proper implementation of vulnerability modelling actions. Alas, many developing countries face a shortage of know...

  • Article
  • Open Access
21 Citations
4,769 Views
11 Pages

Better Not to Use Vulnerability’s Reference for Exploitability Prediction

  • Heedong Yang,
  • Seungsoo Park,
  • Kangbin Yim and
  • Manhee Lee

8 April 2020

About half of all exploit codes will become available within about two weeks of the release date of its vulnerability. However, 80% of the released vulnerabilities are never exploited. Since putting the same effort to eliminate all vulnerabilities ca...

  • Article
  • Open Access
23 Citations
4,292 Views
19 Pages

Evaluation of the Risk Induced by Soil Erosion on Land Use. Case Study: Guruslău Depression

  • Andreea Costea,
  • Stefan Bilasco,
  • Ioan-Aurel Irimus,
  • Sanda Rosca,
  • Iuliu Vescan,
  • Ioan Fodorean and
  • Paul Sestras

7 January 2022

Changes in land use, increasing of agricultural areas to the detriment of wooded ones, and poor management of agricultural land, along with the impact of current changes in the climate (reflected in the increase of the climate aggression index) makes...

  • Article
  • Open Access
9 Citations
4,537 Views
19 Pages

In most parts of sub-Saharan Africa, precipitation is impacted by climate change. In some countries like Cameroon, it is still not clear how maize, millet and rice will respond to changes in growing season precipitation. This work examines the exposu...

  • Article
  • Open Access
11 Citations
4,512 Views
18 Pages

Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector

  • Nikolaos Nikolaou,
  • Andreas Papadakis,
  • Konstantinos Psychogyios and
  • Theodore Zahariadis

Vulnerability identification and assessment is a key process in risk management. While enumerations of vulnerabilities are available, it is challenging to identify vulnerability sets focused on the profiles and roles of specific organizations. To thi...

  • Article
  • Open Access
19 Citations
6,173 Views
10 Pages

21 August 2018

In this study, we compile and analyse 136,920 records of flood and 50,967 records of drought from a survey-based database to investigate recent changes in annual occurrence and economical cost in the United States. Results show that an average of 652...

  • Article
  • Open Access
4 Citations
3,607 Views
15 Pages

6 February 2023

COVID-19 forced a number of changes in many areas of life, which resulted in an increase in human activity in cyberspace. Furthermore, the number of cyberattacks has increased. In such circumstances, detection, accurate prioritisation, and timely rem...

  • Article
  • Open Access
1,426 Views
29 Pages

Leveraging Static Analysis for Feedback-Driven Security Patching in LLM-Generated Code

  • Kamel Alrashedy,
  • Abdullah Aljasser,
  • Pradyumna Tambwekar and
  • Matthew Gombolay

Large language models (LLMs) have shown remarkable potential for automatic code generation. Yet, these models share a weakness with their human counterparts: inadvertently generating code with security vulnerabilities that could allow unauthorized at...

  • Article
  • Open Access
4 Citations
4,060 Views
18 Pages

Factors Influencing Endangered Marine Species in the Mediterranean Sea: An Analysis Based on IUCN Red List Criteria Using Statistical and Soft Computing Methodologies

  • Dimitris Klaoudatos,
  • Teodora Karagyaurova,
  • Theodoros G. I. Pitropakis,
  • Aikaterini Mari,
  • Dimitris R. Patas,
  • Maria Vidiadaki and
  • Konstantinos Kokkinos

The Mediterranean Sea is the second largest biodiversity hotspot on earth, with over 700 identified fish species is facing numerous threats. Of more than 6000 taxa assessed for the IUCN Red List, a minimum of 20% are threatened with extinction. A tot...

  • Article
  • Open Access
12 Citations
4,256 Views
18 Pages

21 March 2022

Containers and microservices have become the most popular method for hosting IoT applications in cloud servers. However, one major security issue of this method is that if a container image contains software with security vulnerabilities, the associa...

  • Review
  • Open Access
10 Citations
4,674 Views
21 Pages

Identifying Factors to Develop and Validate Social Vulnerability to Floods in Malaysia: A Systematic Review Study

  • Ismallianto Isia,
  • Tony Hadibarata,
  • Muhammad Noor Hazwan Jusoh,
  • Rajib Kumar Bhattacharjya,
  • Noor Fifinatasha Shahedan,
  • Norma Latif Fitriyani and
  • Muhammad Syafrudin

23 August 2023

Flood disasters, a natural hazard throughout human history, have caused significant damage to human safety and infrastructure. This paper presents a systematic study using databases from Springer Link, Science Direct, JSTOR, and Web of Science. The s...

  • Article
  • Open Access
43 Citations
7,850 Views
21 Pages

Integration of Vulnerability and Hazard Factors for Landslide Risk Assessment

  • Patricia Arrogante-Funes,
  • Adrián G. Bruzón,
  • Fátima Arrogante-Funes,
  • Rocío N. Ramos-Bernal and
  • René Vázquez-Jiménez

Among the numerous natural hazards, landslides are one of the greatest, as they can cause enormous loss of life and property, and affect the natural ecosystem and their services. Landslides are disasters that cause damage to anthropic activities and...

  • Review
  • Open Access
45 Citations
6,504 Views
21 Pages

Vulnerable populations may be more vulnerable to mental health problems posed by the coronavirus disease 2019 (COVID-19) pandemic. A systematic review was performed to compare the mental health impact of COVID-19 between vulnerable and non-vulnerable...

  • Review
  • Open Access
28 Citations
5,028 Views
20 Pages

Systematic Review of Multi-Dimensional Vulnerabilities in the Himalayas

  • Hameeda Sultan,
  • Jinyan Zhan,
  • Wajid Rashid,
  • Xi Chu and
  • Eve Bohnett

The Himalayan region is a fragile high mountain landscape where the population experiences acute vulnerability within a complex coupled human–natural system due to environmental, social, and economic linkages. The lack of significant regional a...

  • Article
  • Open Access
12 Citations
1,950 Views
40 Pages

Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities

  • Igor Kotenko,
  • Konstantin Izrailov,
  • Mikhail Buinevich,
  • Igor Saenko and
  • Rajeev Shorey

2 July 2023

This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the s...

  • Article
  • Open Access
11 Citations
6,191 Views
30 Pages

Detection of Vulnerabilities in Smart Buildings Using the Shodan Tool

  • Sofía Mulero-Palencia and
  • Victor Monzon Baeza

28 November 2023

Smart buildings, integral components of modern urban landscapes, are confronted with diverse vulnerabilities that jeopardize system robustness, cybersecurity, data confidentiality, and the well-being of the occupants. This work aimed to identify and...

  • Proceeding Paper
  • Open Access
1,714 Views
4 Pages

The New Methods for Rapid Exposure and Seismic Vulnerability Assessment. How Do They Adapt to Different Scenarios?

  • Yolanda Torres,
  • José Juan Arranz,
  • Sandra Martínez-Cuevas,
  • Jorge Miguel Gaspar-Escribano,
  • Belén Benito,
  • Alejandra Staller and
  • Igor Gómez

We present a procedure for exposure and vulnerability evaluation that integrates LiDAR, orthophotos, and other ancillary datasets. It comprises three phases: (1) city stratification into homogeneous regions; (2) exposure database compilation; and (3)...

  • Article
  • Open Access
38 Citations
8,398 Views
22 Pages

Drought Risk Assessment Based on Vulnerability Surfaces: A Case Study of Maize

  • Hao Guo,
  • Xingming Zhang,
  • Fang Lian,
  • Yuan Gao,
  • Degen Lin and
  • Jing’ai Wang

18 August 2016

Agriculture is a sector easily affected by meteorological conditions. Crop yield reduction, even regional conflicts, may occur during a drought. It is extremely important to improve the state of our knowledge on agricultural drought risk. This study...

  • Feature Paper
  • Article
  • Open Access
27 Citations
11,952 Views
25 Pages

Vulnerability Management Models Using a Common Vulnerability Scoring System

  • Michał Walkowski,
  • Jacek Oko and
  • Sławomir Sujecki

19 September 2021

Vulnerability prioritization is an essential element of the vulnerability management process in data communication networks. Accurate prioritization allows the attention to be focused on the most critical vulnerabilities and their timely elimination;...

  • Article
  • Open Access
10 Citations
5,261 Views
22 Pages

Mapping Geospatial Processes Affecting the Environmental Fate of Agricultural Pesticides in Africa

  • Chantal M. J. Hendriks,
  • Harry S. Gibson,
  • Anna Trett,
  • André Python,
  • Daniel J. Weiss,
  • Anton Vrieling,
  • Michael Coleman,
  • Peter W. Gething,
  • Penny A. Hancock and
  • Catherine L. Moyes

The application of agricultural pesticides in Africa can have negative effects on human health and the environment. The aim of this study was to identify African environments that are vulnerable to the accumulation of pesticides by mapping geospatial...

  • Article
  • Open Access
798 Views
19 Pages

Bridging the Seismic Vulnerability Data Gap Through UAV and 360° Imagery: The Case of Nejapa, El Salvador

  • Yolanda Torres,
  • Jorge M. Gaspar-Escribano,
  • Joaquín Martín,
  • Sandra Martínez-Cuevas and
  • Alejandra Staller

23 October 2025

In Latin America, high seismic activity drives countries to develop disaster risk reduction policies based on seismic risk studies. This work demonstrates the feasibility of creating a seismic exposure and vulnerability database using remotely sensed...

  • Article
  • Open Access
10 Citations
7,407 Views
19 Pages

The coastal zones of Oman are frequently exposed to tropical cyclones and are expected to be overwhelmed by tsunami waves that originate from marine earthquakes in the Indian Ocean. Inundation of low-lying coastal lands is, hence, inevitable. This st...

  • Review
  • Open Access
391 Views
25 Pages

Home Visiting Interventions and Their Impact on Mental Health, Psychosocial, and Parenting Practice Outcomes of Vulnerable Caregivers: A Systematic Review and Meta-Analysis

  • Sara Cibralic,
  • Wengtong Wu,
  • Bright Opoku Ahinkorah,
  • Christa Lam-Cassettari,
  • Susan Woolfenden,
  • Jane Kohlhoff,
  • Rebekah Grace,
  • Lynn Kemp,
  • Patrice Johnson and
  • Valsamma Eapen
  • + 3 authors

Past reviews have found home visiting interventions to be successful at improving caregiver outcomes. Though, no review has looked specifically at the effect of home visiting interventions on caregivers with high vulnerability and complex needs. This...

  • Review
  • Open Access
1 Citations
865 Views
19 Pages

An Overview of Instruments to Assess Vulnerability in Healthcare: A Scoping Review

  • Filipa Andrade,
  • Ana Resende,
  • Clara Roquette Viana,
  • Amélia Simões Figueiredo and
  • Fernanda Loureiro

8 September 2025

Background/Objectives: Vulnerability is a multifaceted concept frequently addressed in healthcare, reflecting individuals’ and families’ conditions that may affect health outcomes. The availability of validated instruments to assess vulne...

  • Article
  • Open Access
75 Citations
11,619 Views
25 Pages

Flood Hazard Mapping Using the Flood and Flash-Flood Potential Index in the Buzău River Catchment, Romania

  • Mihnea Cristian Popa,
  • Daniel Peptenatu,
  • Cristian Constantin Drăghici and
  • Daniel Constantin Diaconu

12 October 2019

The importance of identifying the areas vulnerable for both floods and flash-floods is an important component of risk management. The assessment of vulnerable areas is a major challenge in the scientific world. The aim of this study is to provide a m...

of 23