共 18 条
- [1] Deng Y., Mahadevan S., Zhou D., Vulnerability assessment of physical protection systems: a bio-inspired approach, International Journal of Unconventional Computing, 11, 3-4, pp. 227-243, (2015)
- [2] Wang S.L., Yue X., Vulnerability analysis of interdependent infrastructure systems, Application Research of Computers, 51, 1, pp. 328-337, (2014)
- [3] Baker G., A vulnerability assessment methodology for critical infrastructure sites
- [4] Barabasi A.L., Albert R., Emergence of scaling in random networks, Science, 286, 5349, pp. 509-512, (1999)
- [5] Fuchs S., Birkmann J., Glade T., Vulnerability assessment in natural hazard and risk analysis: current approaches and future challenges, Natural Hazards, 64, 3, pp. 1969-1975, (2012)
- [6] Zhang W., Li Q., Wang W., Analysis of characteristics, manifestations and essence of SOS safety problem, China Safety Science Journal, 24, 9, pp. 88-94, (2014)
- [7] Yang H., Liu H., Study on computer vulnerability taxonomy, Computer Engineering & Design, 25, 7, pp. 1143-1145, (2004)
- [8] Han G., Yuan J., Li K., Research on the urban vulnerability in Lanzhou, Journal of Arid Land Resources and Environment, 30, 11, pp. 70-76, (2016)
- [9] Shi Y., Xu S., Shi C., Et al., Progress in research on vulnerability of natural disasters, Journal of Institute of Disaster Prevention, 20, 2, pp. 131-137, (2011)
- [10] Du S., Wang H., Liu S., A groundwater vulnerability assessment method based on typical karst region in north China, Environmental Science & Technology, pp. 471-475, (2014)