Author:
Tularam Gurudeo Anand,Properjohn Mark
Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference40 articles.
1. Apostolakis, G.E. and Lemon, D.M. (2005) A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis 25 (2): 361–376.
2. Australian Broadcasting Commission. (2003) Sabotage deprives 300 000 Iraqis of water: ICRC (online) ABC News. 17 August, http://www.abc.net.au/news/stories/2003/08/17/926250.htm , accessed 12 December 2009.
3. Beaglehole, R., Irwin, A. and Prentice, T. (2004) The World Health Report 2004: Changing History. Geneva: World Health Orgnization.
4. Berger, B. and Stevenson, A. (1955) Feasibility of biological warfare against public water supplies. Journal of American Water Works Association (JAWWA) 47 (2): 101–110.
5. Chalecki, E.L. (2002) A new vigilance: Identifying and reducing the risks of environmental terrorism. Global Environmental Politics 2 (1): 46–64.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Financial Investments in the Global Water Market;Finance for Sustainability in a Turbulent Economy;2022-06-24
2. Network Security Risk Investigation System Based on Internet of Things Technology;2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA);2021-05
3. Allocating countermeasures to defend water distribution systems against terrorist attack;Reliability Engineering & System Safety;2018-11
4. Subsurface Acid Sulphate Pollution and Salinity Intrusion in Coastal Groundwater Environments;Flow and Transport in Subsurface Environment;2018
5. Synergic security for smart water networks;Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks;2017-04-21