[1] Marco A Janssen, Michael L Schoon, Weimao Ke, et al. Scholarly networks on resilience, vulnerability and adaptation within the human dimensions of global environmental change[J]. Global Environmental Change, 2006, 16 (3): 240-252. [2] Giuseppe Formetta, Luc Feyen. Empirical evidence of declining global vulnerability to climate-related hazards[J]. Global Environmental Change, 2019, 57: 101920. [3] Peter WeiBhuhn. Indexing the vulnerability of biotopes to landscape changes[J]. Ecological Indicators, 2019, 102: 316-327. [4] Genevieve E O'Connor, Casey E Newmeyer, Nancy Yee Ching Wong, et al. Conceptualizing the multiple dimensions of consumer financial vulnerability[J]. Journal of Business Research, 2019, 100: 421-430. [5] Tarik Dogru, Elizabeth A Marchio, Umit Bulut, et al. Climate change: Vulnerability and resilience of tourism and the entire economy[J]. Tourism Management, 2019, 72: 292-305. [6] Jukka Ruohonen. A look at the time delays in CVSS vulnerability scoring[J]. Applied Computing and Informatics, 2019, 15 (2): 129-135. [7] Moges Alemu Tikuneh, Getachew Biru Worku. Identification of system vulnerabilities in the Ethiopian electric power system[J]. Global Energy Interconnection, 2018, 1 (3): 358-365. [8] GAO Guibing, YUE Wenhui, OU Wenchu, et al. Vulnerability evaluation method applied to manufacturing systems[J]. Reliability Engineering & System Safety, 2018, 180: 255-265. [9] 陈世明, 马斐, 高彦丽. 电力信息-物理系统的建模与脆弱性分析[J]. 计算机应用与软件, 2020, 37 (05): 90-95+101. CHEN Shiming, MA Fei, GAO Yanli. Modeling and vulnerability analysis of electrical cyber-physical system[J]. Computer Applications and Software,2020, 37 (05): 90-95+101. [10] 况晓辉, 刘强, 李响, 等. 基于机器学习的软件脆弱性分析方法综述[J]. 计算机工程与科学, 2018, 40 (11): 2000-2007. KUANG Xiaohui, LIU Qiang, LI Xiang, et al. Survey on software vulnerability analysis based on machine learning[J]. Computer Engineering and Science, 2018, 40 (11): 2000-2007. [11] 李张元, 赵忠文, 杨苗本. 基于复杂网络的空间信息网脆弱性研究综述[J]. 兵器装备工程学报, 2018.6, 39 (6): 159-164. LI Zhangyuan, ZHAO Zhongwen, YANG Miaoben. Literature Review on Vulnerability of Space Information Network Based on Complex Networks[J]. Journal of Sichuan Ordnance, 2018.6, 39 (6): 159-164. [12] 左朝阳, 吴玉彬, 何星. 区间变时滞系统的时滞相关鲁棒非脆弱H∞控制[J]. 兵器装备工程学报, 2018.12, 39 (12): 123-132. ZUO Zhaoyang, WU Yubin, HE Xing. Non-fragile H∞ robust controller design for interval time-varying delay systems[J]. Journal of Sichuan Ordnance, 2018.12, 39 (12): 123-132. [13] 赵娟, 高正明. 支撑体对γ辐射物探测数据的影响[J]. 核技术, 2016, 39 (2): 33-38. ZHAO Juan, GAO Zhengming. Influence of the support body on radiation detection for gamma radiator[J]. Nuclear Techniques, 2016, 39 (2): 33-38. [14] 赵娟, 高正明. 基于辐射探测器阵列的单个γ源定位方法[J]. 核技术, 2016, 39 (1): 29-33. ZHAO Juan, GAO Zhengming. Location method of a single gamma source based on the detectors array[J].Nuclear Techniques, 2016, 39 (1): 29-33. [15] 尚爱国. 核武器辐射防护技术基础[M]. 西安: 西北工业大学出版社, 2007:26-29. |