1MURRAY A T, MATISZIW T C, GRUBESIC T H. Critical network infrastructure analysis: Interdiction and system flow [ J ]. Journal of Geographical Systems, 2007 (2) : 103 -117.
2JANSSEN M A, SCHOON M L, KE W, et al. Scholarly net works on resilience, vulnerability and adaptation within the human dimensions of global environmental change [ J ]. Global Environmental Change, 2006 (3): 240-252.
3GEORGE H, BAKER III. A Vulnerability Assessment Methodology for Critical Infrastructure Facilities. A Vulnerability Assessment Meth- odology for Critical Infrastructure Sites (Selected Works of George H Baker), 2005, April, Harrisonburg.
4HOLMGREN A J. Using graph models to analyze the vulnerability of electric power networks [J]. Risk Analysis, 2006 (4) : 955 -969.
5ZHANG G H, ZHANG J H, PENG Q, et al. Index system and meth- ods for power grid security assessment [ J ]. Power System Technology, 2009 (4): 30-34.
6SAATY T L. Decision Making with Dependence and Feedback: The Analytic Network Process. Pittsburgh : RWS Publications, 1996 : 84 - 136.
7EZELL B C. Infrastructure Vulnerability Assessment Model (I - VAM) [J]. Risk Analysis, 2007 (3): 571-583.
9American Association of State and Highway Transportation Officials (AASHTO) LRFD - US - 3. Bridge design specifications, 2004.
10JOHARI R, TAN D K H. End - to - end congestion control for the Internet: Delays and stability [ J]. IEEE/ACM Transactions on Net- working, 2001, 9 (6): 818-832.