1. Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Englewood Cliffs (1993)
2. Boginski, V.L., Commander, C.W., Turko, T.: Polynomial-time identification of robust network flows under uncertain arc failures. Optim. Lett. 3(3), 461–473 (2009)
3. Chołda, P., Følstad, E.L., Helvik, B.E., Kuusela, P., Naldi, M., Norros, I.: Towards risk-aware communications networking. Reliab. Eng. Syst. Saf. 109, 160–174 (2013)
4. Garcia, M.L.: The Design and Evaluation of Physical Protection Systems, 2nd edn. Sandia National Laboratories (2007)
5. Gordon, K.A., Wyss, G.D.: Comparison of two methods to quantify cyber and physical security effectiveness. Technical Report SAND2005-7177, Sandia National Laboratories, 2005