Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modelling and Simulation
Reference44 articles.
1. I. Akgun, A. Kandakoglu and A.F. Ozok, Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism, Expert Systems with Applications, vol. 37, pp. 3561–3573, 2010.
2. W.H. Au, K.C.C. Chan and X. Yao, A novel evolutionary data mining algorithm with applications to churn prediction, IEEE Transactions on Evolutionary Computation, vol. 7(6), pp. 532–545, 2003.
3. W. Beyeler, T. Brown and S. Conrad, A modular dynamic simulation model of infrastructure interdependencies, Proceedings of the Twentieth International Conference of the System Dynamics Society, 2002.
4. T., Brown, W., Beyeler and D. Barton, Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems, International Journal of Critical Infrastructures, vol. 1(1), pp. 108–117, 2004.
5. C.L. Chai, X. Liu, W.J. Zhang and Z. Baber, Application of social network theory to prioritizing Oil & Gas industries protection in a networked critical infrastructure system, Journal of Loss Prevention in the Process Industries, vol. 24(5), pp. 688–694, 2011.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献