[1] GIBB C.A critical analysis of vulnerability[J].International Journal of Disaster Risk Reduction, 2018, 28:327-334[2] BONG-TAE K, CHRISTOPHER L B, DO-HOON N.Assessment on the vulnerability of Korean aquaculture to climate change[J].Marine Policy, 2019, 99:111-122[3] VILLEGAS-GOáZALEZ P A, RAMOS-CA?óN A M, GONZáLEZ-MéNDEZ M, et al.Territorial vulnerability assessment frame in Colombia: Disaster risk management[J].International Journal of Disaster Risk Reduction, 2017, 21:384-395[4] CHENG-HSIEN H, CHENG-MIN F.The highway resilience and vulnerability in Taiwan[J].Transport Policy, 2018, :-[5] LI FENG, WANG WENHE, XU JIANG, et al.Comparative study on vulnerability assessment for urban buried gas pipeline network based on SVM and ANN methods[J].Process Safety and Environmental Protection, 2019, 122:23-32[6] MALEKMOHAMMADI B, JAHANISHAKIB F.Vulnerability assessment of wetland landscape ecosystem services using driver-pressure-state-impact-response (DPSIR) model[J]. [J].Ecological Indicators, 2017, 82:293-303[7]WOLF S, HINKEL J, HALLIER M, et al.Clarifying vulnerability definitions and assessments using formalisation[J].International Journal of Climate Change Strategies and Management, 2013, 5(1):54-70[8] SPINK J, MOYER D C, SPEIER-PERO C.Introducing the Food Fraud Initial Screening model (FFIS)[J].Food Control, 2016, 69:306-314[9]DHS.National Critical Infrastructure Security and Resilience Research and Development Plan[J]., 2015, :-[10]NIST.Managing information security risk: organization, mission, and information system view[J]., 2011, :-[11] SPINK J, ORTEGA D L, CHEN C, et al.Food fraud prevention shifts the food risk focus to vulnerability[J]. [J].Trends in Food Science & Technology, 2017, 62:215-220[12] IPCC.Climate Change 2001: Impacts, Adaptation and Vulnerability[M]. The Press Syndicate of the University of Cambridge, 2001.[13]薛莹莹, 贺山峰, 吴绍洪.四川省自然灾害社会脆弱性评价研究[J].华北地震科学, 2018, 36(4):33-40[14] 颜世伟, 蒋丽伟, 张月莹.基于层次分析法的伊金霍洛旗生态脆弱性评价[J].林业资源管理, 2018, (6):45-49[15]KHAZAI B, KUNZ-PLAPP T, BüSCHER C, et al.VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments[J].International Journal of Disaster Risk Science, 2014, 5(1):55-73[16] ABEDI A, GAUDARD L, ROMERIO F.Review of major approaches to analyze vulnerability in power system[J].Reliability Engineering & System Safety, 2019, 183:153-172[17] 楼甜甜.典型果蔬“三剂”风险评估及基于脆弱性评价模型的预警初探[D]. 浙江大学, 2017: 7-14.[18]杨飞, 马超, 方华军.脆弱性研究进展:从理论研究到综合实践[J].生态学报, 2019, 39(2):1-13[19]蔡海生, 刘木生, 李凤英, 等.生态环境脆弱性静态评价与动态评价[J].江西农业大学学报, 2009, 30(1):149-155[20] 孙凌云, 孜比布拉·司马义, 王颖红, 等.基于变异系数-综合指数法的乌鲁木齐城市脆弱性评价[J].安全与环境工程, 2017, 06:18-23[21]李鹤, 张平宇, 程叶青.脆弱性的概念及其评价方法[J].地理科学进展, 2008, 27(2):18-25[22] MORAGUES-FAUS A, SONNINO R, MARSDEN T.Exploring European food system vulnerabilities: Towards integrated food security governance[J]. [J].Environmental Science & Policy, 2017, 75:184-215[23] 刘倩倩.流域水资源脆弱性评价与预测研究[D]. 南京林业大学, 2017: 4-5.[24]夏军, 邱冰, 潘兴瑶, 等.气候变化影响下水资源脆弱性评估方法及其应用[J].地球科学进展, 2012, 27(4):443-451[25] 乔萌萌.苏州市水资源脆弱性研究[D]. 苏州科技大学, 2017: 10-11.[26]张雷, 涂慰云, 孙蔡亮, 等.基于GIS图层叠置法的莆田市雷灾脆弱性研究[J].海峡科学, 2017, 12:84-86[27]蔡道明, 李柏, 张平仓, 等.基于的三峡库区湖北段土壤侵蚀潜在危险度评价[J].水利水电技术, 2017, 48(9):223-228[28] ROUMANI Y, NWANKPA J K, ROUMANI Y F.Time series modeling of vulnerabilities[J].Computers & Security, 2015, 51:32-40[29]何超, 李萌, 李婷婷, 等.多目标综合评价中四种确定权重方法的比较与分析[J].湖北大学学报自科版, 2016, 38(2):172-178[30]BEERMANN M.Linking corporate climate adaptation strategies with resilience thinking[J].Journal of Cleaner Production, 2011, 19(8):836-842[31] DE BRITO M M, EVERS M, H?LLERMANN B.Prioritization of flood vulnerability, coping capacity and exposure indicators through the Delphi technique: A case study in Taquari-Antas basin, Brazil[J]. [J].International Journal of Disaster Risk Reduction, 2017, 24:119-128[32]楼甜甜, 陆柏益, 张星联.基于AHP法的双孢蘑菇质量安全脆弱性评价模型的建立[J].农产品质量与安全, 2016, 4:28-34[33]刘笑笑, 陈岩.基于熵权法的流域水资源脆弱性评价——以淮河流域为例[J].长江科学院院报, 2016, 33(9):10-17[34]杨峰, 马铭.高校信息化工程多级模糊评价模型构建标准[J].吉林大学学报信息科学版, 2018, 36(06):101-107[35]刘大海, 宫伟, 邢文秀, 等.基于-熵权法的海岛海岸带脆弱性评价指标权重综合确定方法[J].海洋环境科学, 2015, 34(3):462-467[36] 朱怡娟.武汉市水资源脆弱性评价研究[D]. 华中师范大学, 2015: 18-19.[37] 赵玲.基于BP神经网络的城市燃气管网系统脆弱性评价[D]. 重庆大学, 2014: 19-20.[38] 孙颖.食品欺诈的概念、类型与多元规制[J].中国市场监管研究, 2017, :19-23[39] SPINK J.GFSI Direction on Food Fraud and Vulnerability Assessment (VACCP)[J]., 2014, :-[40]SPINK J, MOYER D C.Defining the Public Health Threat of Food Fraud[J].Journal of Food Science, 2011, 76(9):R157-163[41]李丹, 王守伟, 臧明伍, 等.美国应对经济利益驱动型掺假和食品欺诈的经验及对我国的启示[J].食品科学, 2016, 37(7):259-263[42] JOHNSON R.Food Fraud and Economiclly Motiviated Adulteration of Food and Food Ingredient[R]. https://fas.org/sgp/crs/misc/R43358.pdf. Congressional Research Service, 2014.[43]European Commission.Rapid Alert System for Food and Feed[J]., 2017, :-[44] USP.Food Fraud Database[J]., 2017, :-[45]吴恒, 等.掷出窗外[J]., 2012, :-[46] LAGAD R A, SINGH S K, RAI V K.Rare earth elements and (87)Sr/(86)Sr isotopic characterization of Indian Basmati rice as potential tool for its geographical authenticity[J]. , [J].Food Chemistry, 2017, 217:254-265[47] UNCU A T, UNCU A O, FRARY A, et al.Barcode DNA length polymorphisms vs fatty acid profiling for adulteration detection in olive oil[J].Food Chemistry, 2017, 2017, :1026-1033[48] ZHANG LIANGXIAO, HUANG XIAORONG, LI PEIW, et al.Multivariate adulteration detection for sesame oil[J].Chemometrics and Intelligent Laboratory Systems, 2017, 161:147-150[49] 孙娟.基于拉曼光谱技术和化学计量学方法的大米品种产地的快速鉴别方法[D]. 江南大学, 2016.[50] 梁文文.分析食品欺诈形势,寻求解决应对方案[J].食品安全导刊, 2018, :30-31[51]SSAFE.Food Fraud Vulnerability Self-assessment Tool[J]., 2017, :-[52]SWAINSON M.Food sector challenges and the role of technical and quality management[J]., 2019, :5-7[53]李丹, 王守伟, 臧明伍, 等.国内外经济利益驱动型食品掺假防控体系研究进展[J].食品科学, 2018, 39(1):320-325[54] VAN RUTH S M, HUISMAN W, LUNING P A.Food fraud vulnerability and its key factors[J].Trends in Food Science & Technology, 2017, 67:70-75[55] VAN RUTH S M.Food fraud and vulnerability assessments[J]., 2018, :1-7[56] VAN RUTH S M, LUNING P A, SILVIS I C J, et al.Differences in fraud vulnerability in various food supply chains and their tiers[J].Food Control, 2018, 84:375-381[57] SILVIS I C J, VAN RUTH S M, VAN DER FELS-KLERX H J, et al.Assessment of food fraud vulnerability in the spices chain: An explorative study[J].Food Control, 2017, 81:80-87[58] YANG Y, HUISMAN W, HETTINGA K A, et al.Fraud vulnerability in the Dutch milk supply chain: Assessments of farmers, processors and retailers[J].Food Control, 2019, 95:308-317[59]黄传峰, 曹进, 张庆合, 等.食品真实性关键技术在监管科学领域的研究建议[J].食品安全质量检测学报, 2018, 9(14):3864-3869[60] SOON J M, KRZYZANIAK S C, SHUTTEIEWOOD Z, et al.Food fraud vulnerability assessment tools used in food industry[J].Food Control, 2019, :225-232 |