-
3
-
-
0003732354
-
-
2nd edn. Oxford University Press, New York
-
Leontief, W.: Input-Output Economics. 2nd edn. Oxford University Press, New York (1986).
-
(1986)
Input-Output Economics
-
-
Leontief, W.1
-
5
-
-
74949129979
-
Wassily Leontief: In appreciation
-
Baumol, W.J., ten Raa, T.: Wassily Leontief: in appreciation. Eur. J. Hist. Econ. Thought, Taylor & Francis Journals 16(3), 511–522 (2009).
-
(2009)
Eur. J. Hist. Econ. Thought, Taylor & Francis Journals
, vol.16
, Issue.3
, pp. 511-522
-
-
Baumol, W.J.1
Ten Raa, T.2
-
6
-
-
0035696915
-
Identifying Understanding and analyzing critical infrastructure interdependencies
-
Rinaldi, S.M., Peerenboom P.J.: Identifying Understanding and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 11–25 (2001).
-
(2001)
IEEE Control Syst. Mag
, pp. 11-25
-
-
Rinaldi, S.M.1
Peerenboom, P.J.2
-
8
-
-
31544474688
-
-
Cornell University, Department of City and Regional Planning, Ithaca, NY
-
Liu, Z., Ribeiro, R., Warner, M.: Comparing child care multipliers in the regional economy: analysis from 50 states. Cornell University, Department of City and Regional Planning, Ithaca, NY (2004).
-
(2004)
Comparing Child Care Multipliers in the Regional Economy: Analysis from 50 States
-
-
Liu, Z.1
Ribeiro, R.2
Warner, M.3
-
9
-
-
34249856448
-
A risk-based input-output methodology for measuring the effects of the august 2003 northeast blackout
-
Anderson, C.W., Santos, J.R., Haimes, Y.Y.: A risk-based input-output methodology for measuring the effects of the august 2003 northeast blackout. Econ. Model. Disaster Impact Anal. 19(2), 183–204 (2007).
-
(2007)
Econ. Model. Disaster Impact Anal
, vol.19
, Issue.2
, pp. 183-204
-
-
Anderson, C.W.1
Santos, J.R.2
Haimes, Y.Y.3
-
10
-
-
84958083889
-
-
The Fight Against Terror—Singapore’s National Security Strategy, Accessed 16 July 2015
-
Cf. National Security Coordination Centre.: The Fight Against Terror—Singapore’s National Security Strategy (2004). www.nscs.gov.sg/public/download.ashx?id=48. Accessed 16 July 2015.
-
(2004)
Cf. National Security Coordination Centre
-
-
-
12
-
-
85046299009
-
QGIS Geographic Information System
-
QGIS Development Team
-
QGIS Development Team.: QGIS Geographic Information System. Open Source Geospatial Foundation (2009) http://qgis.osgeo.org.
-
(2009)
Open Source Geospatial Foundation
-
-
-
13
-
-
42749108762
-
Model for cascading failures in complex networks.
-
Crucitti, P., Latora, V., Marchiori, M.: Model for cascading failures in complex networks. Phys. Rev. E 69, 045104 (2004).
-
(2004)
Phys. Rev. E
, vol.69
-
-
Crucitti, P.1
Latora, V.2
Marchiori, M.3
-
14
-
-
84866174683
-
Vulnerability analysis of interdependent infrastructure systems under edge attack strategies.
-
Wang, S., Hong, L., Ouyang, M., Zhang, J., Chen, X.: Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. Saf. Sci. 51, 328–337 (2013).
-
(2013)
Saf. Sci
, vol.51
, pp. 328-337
-
-
Wang, S.1
Hong, L.2
Ouyang, M.3
Zhang, J.4
Chen, X.5
-
17
-
-
33748439665
-
Using graph models to analyze the vulnerability of electric power networks
-
Holmgren, Å.J.: Using graph models to analyze the vulnerability of electric power networks. Risk Anal. 26(4), 955–969 (2006).
-
(2006)
Risk Anal
, vol.26
, Issue.4
, pp. 955-969
-
-
Holmgren, Å.J.1
-
19
-
-
33745198559
-
-
Center for Connected Learning and Computer-Based Modeling, Northwestern University. Evanston, I
-
Wilensky, et al.: HubNet. http://ccl.northwestern.edu/netlogo/hubnet.html. Center for Connected Learning and Computer-Based Modeling, Northwestern University. Evanston, IL (1999).
-
(1999)
Hubnet
-
-
Wilensky1
-
20
-
-
84879972864
-
Identifying Vulnerabilities in Critical Infrastructures by Network Analysis
-
Lam, C.Y., Lin, J., Sim, M.S., Tai, K.: Identifying Vulnerabilities in Critical Infrastructures by Network Analysis. Int. J. Crit. Infrastruct. 9(3), 190–210 (2013).
-
(2013)
Int. J. Crit. Infrastruct
, vol.9
, Issue.3
, pp. 190-210
-
-
Lam, C.Y.1
Lin, J.2
Sim, M.S.3
Tai, K.4
-
21
-
-
84893848754
-
An agent-based modeling and evolutionary optimization approach for vulnerability analysis of critical infrastructure networks
-
Communications in Computer and Information Science, vol., pp. , . Springer
-
Kizhakkedath, A., Tai, K., Sim, M.S., Tiong, R.L.K., Lin, J.: An agent-based modeling and evolutionary optimization approach for vulnerability analysis of critical infrastructure networks. In: AsiaSim 2013—Proceedings of the 13th International Conference on Systems Simulation, Singapore, Communications in Computer and Information Science, vol. 402, pp. 176–187. Springer (2013).
-
(2013)
Asiasim 2013—Proceedings of the 13Th International Conference on Systems Simulation, Singapore
, vol.402
, pp. 176-187
-
-
Kizhakkedath, A.1
Tai, K.2
Sim, M.S.3
Tiong, R.L.K.4
Lin, J.5
-
22
-
-
84958083892
-
Identifying Extreme Risks in Critical Infrastructure Interdependencies
-
Wollongong, Australia
-
Tai, K., Kizhakkedath, A., Lin, J., Tiong, R.L.K., Sim, M.S.: Identifying Extreme Risks in Critical Infrastructure Interdependencies. In: ISNGI 2013—International Symposium for Next Generation Infrastructure, Wollongong, Australia (2013).
-
(2013)
ISNGI 2013—International Symposium for Next Generation Infrastructure
-
-
Tai, K.1
Kizhakkedath, A.2
Lin, J.3
Tiong, R.L.K.4
Sim, M.S.5
|