[1] DENG Y,MAHADEVAN S,ZHOU D. Vulnerability assessment of physical protection systems:A bio-inspired approach[J]. International Journal of Unconventional Computing,2015,11:227-243. [2] DESMIT Z,ELHABASHY A E,WELLS L J,et al. Cyber-Physical vulnerability assessment in manufacturing systems[C]//The,North American Manufacturing Research Conference. 2016. [3] DESMIT Z,ELHABASHY A E,WELLS L J,et al. An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems[J]. Journal of Manufacturing Systems,2017,43:339-351. [4] YIN H,LI B,ZHU J,et al. Measurement method and empirical research on systemic vulnerability of environmental sustainable development capability[J]. Sustainability,2014,6(12):8485-8509. [5] KIZHAKKEDATH A,TAI K,SIM M S,et al. An agent-Based modeling and evolutionary optimization approach for vulnerability analysis of critical infrastructure networks[M]. Berlin Heidelberg:Springer,2013. [6] CAVDAROGLU B,HAMMEL E,MITCHELL J E,et al. Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems[J]. Annals of Operations Research,2013,203(1):279-294. [7] AGUDELO C A R,URIBE O D B,PÁEZ C A. The vulnerability of agricultural and livestock systems to climate variability:using dynamic system models in the Rancheria upper basin (Sierra Nevada de Santa Marta)[J]. Eco Mont-journal on Protected Mountain Areas Research,2015,7(2):50-60. [8] KJØLLE G H,UTNE I B,GJERDE O. Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies[J]. Reliability Engineering & System Safety,2012,105(3):80-89. [9] DAWSON R J,WANG M. An agent-based model for risk-based flood incident management[J]. Natural Hazards,2011,59(1):167-189. [10] ZIO E,FERRARIO E. A framework for the system-of-systems analysis of the risk for a safety-critical plant exposed to external events[J]. Reliability Engineering & System Safety,2013,114(1):114-125. [11] WANG S L,YUE X. Vulnerability analysis of interdependent infrastructure systems[J]. Application Research of Computers,2014,51(1):328-337. [12] ALBINO V,GARAVELLI A C. A methodology for the vulnerability analysis of just-in-time production systems[J]. International Journal of Production Economics. 1995,41:71-80. [13] BALASUNDARAM N. The value relevance of accounting information and its impact on market vulnerability:a study of listed manufacturing companies in sri lanka[J]. Social Science Electronic Publishing,2014,4(18):102-112. [14] KHAKZAD N,GELDER P V. Vulnerability of industrial plants to flood-induced natechs:a bayesian network approach[J]. Reliability Engineering & System Safety,2018,169:403-411. [15] KÓCZA G,BOSSCHE A. Application of the integrated reliability analysis system[J]. Reliability Engineering & System Safety,1999,64:99-107. [16] 柳剑,张根保,李冬英,等. 基于脆性理论的多状态制造系统可靠性分析[J]. 计算机集成制造系统,2014,20(1):155-164. LIU Jian,ZHANG Genbao,LI Dongying,et al. Reliability analysis for multi-state manufacturing system based on brittleness theory[J]. Computer Integrated Manufacturing Systems,2014,20(1):155-164. [17] 高贵兵,岳文辉,张人龙. 基于状态熵的制造系统结构脆弱性评估方法[J]. 计算机集成制造系统,2017, 23(10):2211-2220. GAO Guibing,YUE Wenhui,ZHANG Renlong. Structural vulnerability assessment method of manufacturing systems based on state entropy[J]. Computer Integrated Manufacturing System,2017,23(10):2211-2220. [18] GAO G B,YUE W H,OU W C. A vulnerability evaluating method applied to manufacturing systems[J]. Reliability Engineering & System Safety,2018,180,255-265. [19] SCHÖN T,GUSTAFSSON F,NORDLUND P J. Marginalized particle filters for mixed linear/nonlinear state-space models[J]. IEEE Trans Signal Processing,2005,53(7):2279-2289. [20] LEVITIN G. The universal generating function in reliability analysis and optimization[M]//The universal generating function in reliability analysis and optimization. Springer,2005. [21] LISNIANSKI A. L z-transform for a discrete-state continuous-time Markov process and its applications to multi-state system reliability[M]//Applied Reliability Engineering and Risk Analysis:Probabilistic Models and Statistical Inference. John Wiley & Sons,Ltd,2012:79-95. [22] CHIUCHIÙ D,PIGOLOTTI S. Mapping of uncertainty relations between continuous and discrete time[J]. Physical Review E,2018,97(3):032109. [23] TEN C W,LIU C C,MANIMARAN G. Vulnerability assessment of cybersecurity for SCADA systems[J]. IEEE Transactions on Power Systems,2008,23(4):1836-1846. |