Applying spatiotemporal statistics to derive vulnerability patterns resulting from torrent events