Login / Signup
A methodological approach to analyze vulnerability of interdependent infrastructures.
Min Ouyang
Liu Hong
Zijun Mao
Ming-Hui Yu
Fei Qi
Published in:
Simul. Model. Pract. Theory (2009)
Keyphrases
</>
data management
neural network
risk assessment
real time
genetic algorithm
search engine
information systems
image segmentation
multiscale
information technology
probabilistic model
management system
data warehouse