Research Article

An Integrated Method of Supply Chains Vulnerability Assessment

Figure 2

SC vulnerability analysis process.