Return to Article Details Vulnerability analysis of critical infrastructures with the Event Tree Technique Download Download PDF