“…(Jenelius, 2009, Jenelius, 2010, Berdica, 2002, Rashed and Weeks, 2003, Taylor and Susilawati, 2012, Brenkert and Malone, 2005, arising from different interpretations of the concept of vulnerability and the scope of analysis. In general there are two main methods; use of a network wide screen (Jenelius et al, 2006) and techniques based on pre-selection of potentially vulnerable links according to a set of of criteria (Knoop et al, 2012).…”