Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Vulnerability analysis of process plants subject to domino effects
Khakzad, Nima, Reniers, Genserik, Abbassi, Rouzbeh, Khan, Faisal
Published in Reliability engineering & system safety (01.10.2016)
Published in Reliability engineering & system safety (01.10.2016)
Get full text
Journal Article
Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation
Jingwen Liang, Sankar, Lalitha, Kosut, Oliver
Published in IEEE transactions on power systems (01.09.2016)
Published in IEEE transactions on power systems (01.09.2016)
Get full text
Journal Article
Robust vulnerability analysis of nuclear facilities subject to external hazards
Tolo, Silvia, Patelli, Edoardo, Beer, Michael
Published in Stochastic environmental research and risk assessment (01.12.2017)
Published in Stochastic environmental research and risk assessment (01.12.2017)
Get full text
Journal Article
VDES R‐Mode: Vulnerability analysis and mitigation concepts
Lázaro, Francisco, Raulefs, Ronald, Bartz, Hannes, Jerkovits, Thomas
Published in International journal of satellite communications and networking (01.03.2023)
Published in International journal of satellite communications and networking (01.03.2023)
Get full text
Journal Article
Modeling and vulnerability analysis of UAV swarm based on two-layer multi-edge complex network
Yang, Yuheng, Guo, Xing, Hai, Xingshuo, Feng, Qiang, Sun, Bo, Wang, Zili
Published in Reliability engineering & system safety (01.04.2025)
Published in Reliability engineering & system safety (01.04.2025)
Get full text
Journal Article
Road network vulnerability analysis considering the probability and consequence of disruptive events: A spatiotemporal incident impact approach
Ansari Esfeh, Mohammad, Kattan, Lina, Lam, William H.K., Salari, Mostafa, Ansari Esfe, Reza
Published in Transportation research. Part C, Emerging technologies (01.03.2022)
Published in Transportation research. Part C, Emerging technologies (01.03.2022)
Get full text
Journal Article
Vulnerability analysis of cascading dynamics in smart grids under load redistribution attacks
Lee, Lily, Hu, Po
Published in International journal of electrical power & energy systems (01.10.2019)
Published in International journal of electrical power & energy systems (01.10.2019)
Get full text
Journal Article
Ecological vulnerability analysis: A river basin case study
Ippolito, A., Sala, S., Faber, J.H., Vighi, M.
Published in The Science of the total environment (15.08.2010)
Published in The Science of the total environment (15.08.2010)
Get full text
Journal Article
A Shot at Visual Vulnerability Analysis
Kerzner, Ethan, Butler, Lee A., Hansen, Charles, Meyer, Miriah
Published in Computer graphics forum (01.06.2015)
Published in Computer graphics forum (01.06.2015)
Get full text
Journal Article
Review of Automated Vulnerability Analysis of Smart Contracts on Ethereum
Rameder, Heidelinde, di Angelo, Monika, Salzer, Gernot
Published in Frontiers in blockchain (24.03.2022)
Published in Frontiers in blockchain (24.03.2022)
Get full text
Journal Article
Resilient–vulnerability analysis of critical infrastructure, key resources, assets, and facilities
Ewa, Wofai O., Ugwu, Onuegbu O., Okafor, Fidelis O.
Published in Innovative infrastructure solutions : the official journal of the Soil-Structure Interaction Group in Egypt (SSIGE) (01.04.2024)
Published in Innovative infrastructure solutions : the official journal of the Soil-Structure Interaction Group in Egypt (SSIGE) (01.04.2024)
Get full text
Journal Article