共 18 条
[1]
Deng Y., Mahadevan S., Zhou D., Vulnerability assessment of physical protection systems: a bio-inspired approach, International Journal of Unconventional Computing, 11, 3-4, pp. 227-243, (2015)
[2]
Wang S.L., Yue X., Vulnerability analysis of interdependent infrastructure systems, Application Research of Computers, 51, 1, pp. 328-337, (2014)
[3]
Baker G., A vulnerability assessment methodology for critical infrastructure sites
[4]
Barabasi A.L., Albert R., Emergence of scaling in random networks, Science, 286, 5349, pp. 509-512, (1999)
[5]
Fuchs S., Birkmann J., Glade T., Vulnerability assessment in natural hazard and risk analysis: current approaches and future challenges, Natural Hazards, 64, 3, pp. 1969-1975, (2012)
[6]
Zhang W., Li Q., Wang W., Analysis of characteristics, manifestations and essence of SOS safety problem, China Safety Science Journal, 24, 9, pp. 88-94, (2014)
[7]
Yang H., Liu H., Study on computer vulnerability taxonomy, Computer Engineering & Design, 25, 7, pp. 1143-1145, (2004)
[8]
Han G., Yuan J., Li K., Research on the urban vulnerability in Lanzhou, Journal of Arid Land Resources and Environment, 30, 11, pp. 70-76, (2016)
[9]
Shi Y., Xu S., Shi C., Et al., Progress in research on vulnerability of natural disasters, Journal of Institute of Disaster Prevention, 20, 2, pp. 131-137, (2011)
[10]
Du S., Wang H., Liu S., A groundwater vulnerability assessment method based on typical karst region in north China, Environmental Science & Technology, pp. 471-475, (2014)