• No results found

[PDF] Top 20 Resistance in vulnerability with an eye to the vulnerability of power

Has 10000 "Resistance in vulnerability with an eye to the vulnerability of power" found on our website. Below are the top 20 most common "Resistance in vulnerability with an eye to the vulnerability of power".

Resistance in vulnerability with an eye to the vulnerability of power

Resistance in vulnerability with an eye to the vulnerability of power

... affirm vulnerability as ontological and existential condition. Vulnerability affirms both the capacity of the body to act and to be acted upon, to affect and to be ...However, vulnerability is also a ... See full document

7

Sovereignty, vulnerability, and a gendered resistance in Indian occupied Kashmir

Sovereignty, vulnerability, and a gendered resistance in Indian occupied Kashmir

... state power, the mechanisms by which these processes function show the need for reenvisioning ...between vulnerability, resistance and sovereignty through a reading of Khoon Diy ... See full document

32

The politics of vulnerability: affect, relationality, and resistance in UK austerity

The politics of vulnerability: affect, relationality, and resistance in UK austerity

... of vulnerability in specific relation to the transnational regulation of sex work, they suggest that, by mobilising vulnerability to destigmatise sex work practices, advocates highlight sex workers as ... See full document

327

Patching Power System Software Vulnerability Using CNNVD

Patching Power System Software Vulnerability Using CNNVD

... Software vulnerability is a kind of flaw that arises in software or is a hole in the security of the software that allows an attacker to exploit that ...software vulnerability can affect a whole network ... See full document

5

Developing A Simple Survey Procedure For Seismic Risk Evaluation In 2012 Thabeikkyin Earthquake, Upper Myanmar

Developing A Simple Survey Procedure For Seismic Risk Evaluation In 2012 Thabeikkyin Earthquake, Upper Myanmar

... In this study, the RVS for typical local houses is developed and proved work with the samples. It is very important especially in developing countries. Applied in the affected study areas from November 11 th 2012 ... See full document

10

Analysis of coastal vulnerability of Rangsang Island due to climate changes

Analysis of coastal vulnerability of Rangsang Island due to climate changes

... coastal vulnerability was applied along the coast of Rangsang Island by dividing the location into several cells and by buffering 1 km to the sea and 1 km to the ... See full document

8

The Effects of Extreme Media on Political Behavior, Attitudes, and Media Selection

The Effects of Extreme Media on Political Behavior, Attitudes, and Media Selection

... early vulnerability hypothesis, and given the theoretical and empirical evidence for an early cognitive vulnerability to radiation treatment, it is hypothesized that younger age at diagnosis of brain tumor ... See full document

45

Towards an integrated framework for assessing the vulnerability of species to climate change

Towards an integrated framework for assessing the vulnerability of species to climate change

... Systematic conservation planning is an inherently spatial problem; however, climatic space is shifting and our traditional reserve systems are static. Given the current rate of climatic change, it will be impossible to ... See full document

6

Cyber-bullying from a socio-ecological perspective: a review of evidence from cross-national data

Cyber-bullying from a socio-ecological perspective: a review of evidence from cross-national data

... Vulnerability / Resilience Internet use girls Social disadvantage Psychological difficulties Sensation seeking Self-efficacy Vulnerability.. Victimisation[r] ... See full document

24

Fear and Cheating in Atlanta: Evidence for the Vulnerability Thesis

Fear and Cheating in Atlanta: Evidence for the Vulnerability Thesis

... extreme vulnerability of [American] schoolmen to public criticism and pressure and that [such] vulnerability is built into [the American] pattern of local support and control” ... See full document

12

Utilization of the Storie Method to Analyze the Spatial Distribution of Ground Movement Vulnerability in the Limboto Watershed  Area, Gorontalo Province

Utilization of the Storie Method to Analyze the Spatial Distribution of Ground Movement Vulnerability in the Limboto Watershed Area, Gorontalo Province

... Moderate Vulnerability Distribution Area Low and moderate level of ground movement vulnerability each ...of vulnerability level in Limboto ...percentage. Vulnerability level in dominated ... See full document

6

Flood Vulnerability Index for Critical Infrastructure Towards Flood Risk Management

Flood Vulnerability Index for Critical Infrastructure Towards Flood Risk Management

... increasing’s vulnerability against the flood, which are exposure, susceptibility and ...that vulnerability of any scale is a function of the exposure and susceptibility of the system to hazardous conditions ... See full document

13

Vulnerability Scanning

Vulnerability Scanning

... 3) OpenVAS: OpenVAS could be a framework of many tools and offers a comprehensive and powerful vul nerability scanning and vulnerability management answer. Its main part, the safety scanner, is accompanied with a ... See full document

11

Vulnerability in Agriculture

Vulnerability in Agriculture

... Existing climate variability already has a significant impact on agriculture. Extreme weather events have resulted in average losses of EUR 176 million per year during 2000-2007. This represents 0.6% of national GDP, or ... See full document

30

INTEGRATED ASSESSMENT OF VULNERABILITY OF RURAL
HOUSEHOLDS TO CLIMATE STRESS ACROSS REGIONS IN NIGER

INTEGRATED ASSESSMENT OF VULNERABILITY OF RURAL HOUSEHOLDS TO CLIMATE STRESS ACROSS REGIONS IN NIGER

... classification function. Sensitivity (also called the true positive rate, or the recall rate in some fields) measures the proportion of actual positives which are correctly identified as such when the ... See full document

21

Vulnerability assessment for climate induced disasters in Malaysia

Vulnerability assessment for climate induced disasters in Malaysia

... Participants view lack of community awareness and preparedness towards disasters as one of the social vulnerability factors in Malaysia. They argue that due to lack of awareness of the impact and the severity of ... See full document

8

DETECTION AND PREVENTION OF UNKNOWN VULNERABILITES ON ENTERPRISE IP NETWORKS

DETECTION AND PREVENTION OF UNKNOWN VULNERABILITES ON ENTERPRISE IP NETWORKS

... The research on network security metrics has attracted much attention.In another early work, D. balzarotti, M. Monga and S. Sicari [6] proposes a Cooke’s classical method that will find previously unknown ... See full document

10

Implementing Authentication, Data integrity in Wireless Sensor Networks

Implementing Authentication, Data integrity in Wireless Sensor Networks

... In[1] author proposed protocol. The protocol finds vulnerability in discovery and dissemination of information. Such vulnerability adversary updates like critical sections and denial of service. The ... See full document

8

1696 0 cyberissue2002 20 pdf

1696 0 cyberissue2002 20 pdf

... security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have not published workarounds or patches, or which represent scripts that malicious users are ... See full document

44

Nodal vulnerability to targeted attacks in power grids

Nodal vulnerability to targeted attacks in power grids

... of power grids. Additionally, many countries require that the power grids should withstand the scheduled and unscheduled outages of its most critical lines or other ...the power grids can still ... See full document

19

Show all 10000 documents...