ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Ontological Vulnerability Assessment
Web Information Systems Engineering – WISE 2008 Workshops - Lecture Notes in Computer Science
◽
10.1007/978-3-540-85200-1_5
◽
2008
◽
pp. 24-35
◽
Cited By ~ 2
Author(s):
Aaron Steele
Keyword(s):
Vulnerability Assessment
Start Chat
Download Full-text
Related Documents
Cited By
References
Comparing supervised and unsupervised artificial neural network for conducting eco-environment vulnerability assessment
PsycEXTRA Dataset
◽
10.1037/e602232011-014
◽
2010
◽
Author(s):
Zhiyuan Yao
◽
Wei Qi
◽
Xiao-ping Pang
◽
Lan Tao
Keyword(s):
Neural Network
◽
Artificial Neural Network
◽
Vulnerability Assessment
◽
Artificial Neural
Start Chat
Download Full-text
A Study on Vulnerability Assessment for Forest Fires according to Climate Change in Jeju-si and Seogwipo-si
Journal of the Korean Society of Urban Environment
◽
10.33768/ksue.2018.18.2.217
◽
2018
◽
Vol 18
(2)
◽
pp. 217-223
Author(s):
Chaehyun Lim
◽
◽
Changyoung Kim
Keyword(s):
Climate Change
◽
Forest Fires
◽
Vulnerability Assessment
Start Chat
Download Full-text
Development of a Climate Change Vulnerability Assessment Analysis Tool - Based on the Vulnerability Assessment of Forest Fires in Chungcheongnam-do -
Journal of Climate Change Research
◽
10.15531/ksccr.2017.8.3.275
◽
2017
◽
Vol 8
(3)
◽
pp. 275-285
Author(s):
Soo Hyang Yoon
◽
Sang Sin Lee
Keyword(s):
Climate Change
◽
Forest Fires
◽
Vulnerability Assessment
◽
Analysis Tool
◽
Climate Change Vulnerability
◽
Climate Change Vulnerability Assessment
Start Chat
Download Full-text
Climate Vulnerability Assessment
10.1596/28870
◽
2017
◽
Cited By ~ 1
Author(s):
Keyword(s):
Vulnerability Assessment
◽
Climate Vulnerability
Start Chat
Download Full-text
Vulnerability assessment of security systems based on risk entropy and Neyman-Pearson criterion
Mechanical, Information and Industrial Engineering
◽
10.2495/icmiie140651
◽
2015
◽
Author(s):
Haitao Lv
◽
Ruimin Hu
◽
Jun Chen
Keyword(s):
Vulnerability Assessment
◽
Security Systems
◽
Pearson Criterion
Start Chat
Download Full-text
Vulnerability assessment of the geological environment in a coal mine area based on GIS
Advances in Earth and Environmental Sciences
◽
10.2495/icesep130391
◽
2013
◽
Author(s):
Zhexing Wang
◽
Qingxian Sun
◽
Lin Zhang
Keyword(s):
Coal Mine
◽
Vulnerability Assessment
◽
Geological Environment
◽
Mine Area
Start Chat
Download Full-text
Defining orbital debris environmental conditions for spacecraft vulnerability assessment
10.2514/6.1990-3862
◽
1990
◽
Keyword(s):
Environmental Conditions
◽
Vulnerability Assessment
◽
Orbital Debris
Start Chat
Download Full-text
Central Hardwoods ecosystem vulnerability assessment and synthesis: a report from the Central Hardwoods Climate Change Response Framework project
10.2737/nrs-gtr-124
◽
2014
◽
Cited By ~ 23
Author(s):
Leslie Brandt
◽
Hong He
◽
Louis Iverson
◽
Frank R. Thompson
◽
Patricia Butler
◽
...
Keyword(s):
Climate Change
◽
Vulnerability Assessment
◽
Ecosystem Vulnerability
◽
Central Hardwoods
◽
Climate Change Response
◽
Change Response
Start Chat
Download Full-text
Climate change vulnerability assessment for the Chugach National Forest and the Kenai Peninsula
10.2737/pnw-gtr-950
◽
2017
◽
Author(s):
Gregory H. Hayward
◽
Steve Colt
◽
Monica L. McTeague
◽
Teresa N. Hollingsworth
Keyword(s):
Climate Change
◽
Vulnerability Assessment
◽
National Forest
◽
Kenai Peninsula
◽
Climate Change Vulnerability
◽
Climate Change Vulnerability Assessment
Start Chat
Download Full-text
Central Appalachians forest ecosystem vulnerability assessment and synthesis: a report from the Central Appalachians Climate Change Response Framework project
10.2737/nrs-gtr-146
◽
2015
◽
Cited By ~ 14
Author(s):
Patricia R. Butler
◽
Louis Iverson
◽
Frank R. Thompson
◽
Leslie Brandt
◽
Stephen Handler
◽
...
Keyword(s):
Climate Change
◽
Forest Ecosystem
◽
Vulnerability Assessment
◽
Ecosystem Vulnerability
◽
Central Appalachians
◽
Climate Change Response
◽
Change Response
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close