Reducing vulnerability of water supply systems to attack
暂无分享,去创建一个
James H. Lambert | Yacov Y. Haimes | N. C. Matalas | Bronwyn A. Jackson | James F. R. Fellows | Y. Haimes | J. Lambert | N. Matalas | James Fellows | B. A. Jackson
[1] C. Major,et al. Multiobjective Water Resource Planning , 1977 .
[2] T. Megla. Investigation work begins at Peruća dam, Croatia , 1993 .
[3] Kenneth N. Myers. Total Contingency Planning for Disasters: Managing Risk...Minimizing Loss...Ensuring Business Continuity , 1993 .
[4] Robert S. Raucher,et al. Restructuring small systems , 1997 .
[5] Richard Gigliotti,et al. Emergency Planning for Maximum Protection , 1990 .
[6] G. Shackle,et al. Imagination and the Nature of Choice , 1979 .
[7] Peter C. Klingeman,et al. Ensuring the security of public water supplies , 1988 .
[8] Steve Posavec. Living Organisms Vital in Testing for Toxicity , 1997 .
[9] Martin C. Libicki. What Is Information Warfare , 1995 .
[10] Barry K. Myers,et al. Automated Monitoring at Tolt Dam , 1997 .
[11] Yacov Y. Haimes,et al. Hierarchical Holographic Modeling , 1981, IEEE Transactions on Systems, Man, and Cybernetics.