G. Bous, P. Fortemps, F. Glineur, and &. M. Pirlot, ACUTA: A novel method for eliciting additive value functions on the basis of holistic preference statements, European Journal of Operational Research, vol.206, issue.2, pp.435-444, 2010.
DOI : 10.1016/j.ejor.2010.03.009

J. J. Depoy and . Phelan, Risk Assessment for Physical and Cyber Attacks on Critical Infrastructures, MILCOM 2005, 2005 IEEE Military Communications Conference, 2005.
DOI : 10.1109/MILCOM.2005.1605959

D. Furniss, J. Back, and &. A. Blandfod, A resilience markers framework for small teams, Reliability Engineering & System Safety, vol.96, issue.1, 2011.
DOI : 10.1016/j.ress.2010.06.025

M. Hofmann, G. Kjølle, and &. O. Gjerde, Development of indicators to monitor vulnerabilities in power systems, 2012.

P. Huard, Resolution of mathematical programming with nonlinear constraints by the method of centers, Nonlinear Programming, pp.209-219, 1967.

W. E. Kröger and . Zio, Vulnerable Systems, 2011.
DOI : 10.1007/978-0-85729-655-9

G. Sonnevend, An "analytical centre" for polyhedrons and new classes of global algorithms for linear (smooth, convex) programming, Lecture Notes in Control and Information Sciences, pp.866-876, 1985.
DOI : 10.1007/BFb0043914