

Author: Fekete Alexander
Publisher: Inderscience Publishers
ISSN: 1475-3219
Source: International Journal of Critical Infrastructures, Vol.8, Iss.4, 2012-10, pp. : 336-353
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Editorial: Risk and vulnerability of critical infrastructures
Journal of Risk Research, Vol. 7, Iss. 6, 2004-09 ,pp. :





