scispace - formally typeset
Search or ask a question

Showing papers on "Vulnerability (computing) published in 1979"


Proceedings ArticleDOI
01 Jun 1979
TL;DR: In this article, the authors present a methodology for risk management in general state-of-the-art risk management environments, which can be applied to any risk management environment and is applicable to all risk management scenarios.
Abstract: Risk management is concerned with the identification, measurement, control and minimization of impact of uncertain events upon organizations that depend upon automated operations. 11 It is an analytical process with a large number of variables, many of which are unique to the environment under consideration. For this reason, there has not yet been developed within general state-of-the-art a single methodology broadly applicable to all risk management environments. 1 , 10

18 citations


01 Mar 1979
TL;DR: A methodology and a set of computer programs for analyzing an attack on a nonevading surface ship by submarine(s) firing straight-running torpedoes are presented.
Abstract: : This Research Contribution presents a methodology and a set of computer programs for analyzing an attack on a nonevading surface ship by submarine(s) firing straight-running torpedoes. The model is compatible with ship vulnerability curves and may be used to compute the probability the target sustains a particular level of damage. (Author)

1 citations