{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:29:39Z","timestamp":1760239779361,"version":"build-2065373602"},"reference-count":100,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Urbanization is a challenge faced by most countries worldwide and leads to several problems. Due to rapid communication capabilities, conforming the megacities into Ubiquitous cities (U-cities) seems to be a potential solution to mitigate the problems caused by urbanization. Extensive reliance and dependencies of U-cities on information and communication technologies (ICTs) bring forth a new set of risks and vulnerabilities to these megacities. This research investigates the vulnerabilities of ICTs against man-made and natural hazards in a systematic way using the Analytic Hierarchy Process. The study identifies the vulnerabilities of different ICTs in U-cities and helps in improving the system\u2019s resistivity against various hazards. The task is performed by evaluating the level of disruption on the different technologies and areas under the identified man-made and natural hazards. The research provides an insight into the working mechanisms of involved ICTs. It also helps to manage U-cities with more secure and sustainable services. The research identified that the new ICTs-based hazards have emerged and have become among the most influential hazards. The research has concluded that the vulnerabilities of U-cities are significantly different from that of conventional cities and need further studies to develop further understandings. The research recommends similar vulnerability studies for regional areas as well.<\/jats:p>","DOI":"10.3390\/fi12120235","type":"journal-article","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T09:41:41Z","timestamp":1608543701000},"page":"235","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0226-7310","authenticated-orcid":false,"given":"Muhammad Atiq Ur Rehman","family":"Tariq","sequence":"first","affiliation":[{"name":"College of Engineering and Science, Victoria University, Melbourne, VIC 8001, Australia"},{"name":"Institute for sustainable Industries &amp; Livable Cities, Victoria University, P.O. Box 14428, Melbourne, VIC 8001, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9652-6696","authenticated-orcid":false,"given":"Cheuk Yin","family":"Wai","sequence":"additional","affiliation":[{"name":"College of Engineering and Science, Victoria University, Melbourne, VIC 8001, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7758-8365","authenticated-orcid":false,"given":"Nitin","family":"Muttil","sequence":"additional","affiliation":[{"name":"College of Engineering and Science, Victoria University, Melbourne, VIC 8001, Australia"},{"name":"Institute for sustainable Industries &amp; Livable Cities, Victoria University, P.O. Box 14428, Melbourne, VIC 8001, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2020,12,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Management Association (2019). Megacities and Rapid Urbanization, IGI Global.","DOI":"10.4018\/978-1-5225-9276-1"},{"key":"ref_2","unstructured":"Charles, A. (2020, July 10). World Economic Forum. Available online: https:\/\/www.weforum.org\/agenda\/2017\/02\/cities-must-tirelessly-innovative-to-respond-to-their-challenges\/."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.procs.2015.08.554","article-title":"The Ecosystem of Services around Smart Cities: An Exploratory Analysis","volume":"64","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Garg, S. (2019). Impact of Overpopulation on Land Use Pattern. Megacities and Rapid Urbanization, IGI Global.","DOI":"10.4018\/978-1-5225-9276-1.ch001"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1016\/j.jenvman.2011.05.016","article-title":"Resource management as a key factor for sustainable urban planning","volume":"92","author":"Mels","year":"2011","journal-title":"J. Environ. Manag."},{"key":"ref_6","unstructured":"Girardet, H. (2008). Cities, People, Planet: Urban Development and Climate Change, John Wiley & Sons Ltd."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1177\/0165551509100832","article-title":"Ubiquitous City: Urban Technologies, Urban Infrastructure and Urban Informatics","volume":"35","author":"Shin","year":"2009","journal-title":"J. Inf. Sci."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"75","DOI":"10.11108\/kagis.2015.18.2.075","article-title":"An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City","volume":"18","author":"Jo","year":"2015","journal-title":"J. Korean Assoc. Geogr. Inf. Stud."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/j.habitatint.2005.04.001","article-title":"Strategic urban management in China: A case study of Guangzhou Development District","volume":"30","author":"Wong","year":"2006","journal-title":"Habitat. Int."},{"key":"ref_10","unstructured":"The Free Library (2019, November 20). Incheon FEZ Expects Upturn from Smart City Project. Available online: https:\/\/www.thefreelibrary.com\/Incheon+FEZ+expects+upturn+from+Smart+City+project.-a0531750388."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.jum.2019.12.001","article-title":"Data-driven urban management: Mapping the landscape","volume":"9","author":"Engin","year":"2019","journal-title":"J. Urban Manag."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Poslad, S. (2009). Ubiquitous Computing: Smart Devices, Environments and Interactions, John Wiley & Sons Ltd.","DOI":"10.1002\/9780470779446"},{"key":"ref_13","first-page":"53","article-title":"Proposes on Essential Ubiquitous City Service to Guarantee Minimum Quality of Ubiquitous City","volume":"21","author":"Hwang","year":"2013","journal-title":"J. Korean Soc. Geospat. Inf. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhu, W., Panteli, M., and Milanovic, J.V. (2018). Reliability and Vulnerability Assessment of Interconnected ICT and Power Networks Using Complex Network Theory. Proceedings of the 2018 IEEE Power and Energy Society General Meeting (PESGM), Portland, OR, USA, 5\u201310 August 2018, IEEE.","DOI":"10.1109\/PESGM.2018.8586596"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/11424925_10","article-title":"Security threats and their countermeasures of mobile portable computing devices in ubiquitous computing environments","volume":"Volume 3483","author":"Kim","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"ref_16","unstructured":"van Niekerk, B. (2011). Vulnerability Assessment of Modern ICT Infrastructure from an Information Warfare Perspective. [Ph.D. Thesis, University of Kwazulu-Natal]. Available online: http:\/\/hdl.handle.net\/10413\/12295."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MCOM.2017.1600514","article-title":"Internet-of-Things-Based Smart Cities: Recent Advances and Challenges","volume":"55","author":"Mehmood","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/159544.159617","article-title":"Some computer science issues in ubiquitous computing","volume":"36","author":"Weiser","year":"1993","journal-title":"Commun. ACM"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1147\/sj.384.0693","article-title":"The origins of ubiquitous computing research at PARC in the Late 1980s","volume":"38","author":"Weiser","year":"1999","journal-title":"IBM Syst. J."},{"key":"ref_20","first-page":"5","article-title":"Towards an urban planners\u2019 perspective on Smart City","volume":"6","author":"Papa","year":"2013","journal-title":"TeMA"},{"key":"ref_21","unstructured":"Lee, J., and Oh, J. (2008). New Songdo City and the Value of Flexibility: A Case Study of Implementation and Analysis of a Mega-Scale Project. [Ph.D. Thesis, Massachusetts Institute of Technology]. Available online: http:\/\/hdl.handle.net\/1721.1\/58657."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Lee, M., Uhm, Y., Hwang, Z., Kim, Y., Jo, J., and Park, S. (2007, January 21\u201323). An Urban Computing Framework for Autonomous Services in A U-City. Proceedings of the 2007 International Conference on Convergence Information Technology (ICCIT 2007), Gyeongju, Korea.","DOI":"10.1109\/ICCIT.2007.129"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJAPUC.2016040101","article-title":"A theoretical framework for ubiquitous computing","volume":"8","author":"Hashemi","year":"2016","journal-title":"Int. J. Adv. Pervasive Ubiquitous Comput."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Taniar, D., Gervasi, O., Murgante, B., Pardede, E., and Apduhan, B.O. (2010, January 23\u201326). U-City: New Trends of Urban Planning in Korea Based on Pervasive and Ubiquitous Geotechnology and Geoinformation. Proceedings of the Computational Science and Its Applications\u2014ICCSA 2010, Fukuoka, Japan. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-12189-0"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00779-006-0071-x","article-title":"Esterday\u2019s tomorrows: Notes on ubiquitous computing\u2019s dominant vision","volume":"11","author":"Bell","year":"2007","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lee, J., Lee, H., and Kim, T. (2012). Evaluating and assessing a typology of ubiquitous city services by classifying and assigning actual services from an inventory of identified services in practice. Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, ACM.","DOI":"10.1145\/2463728.2463783"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Lee, S.H., Han, J.H., Leem, Y.T., and Yigitcanlar, T. (2008). Towards Ubiquitous City: Concept, Planning, and Experiences in the Republic of Korea, IGI Global.","DOI":"10.4018\/978-1-59904-720-1.ch009"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1177\/1420326X15626503","article-title":"Assessing the green potetial of existing buildings towards smart cities and districts","volume":"25","author":"Capeluto","year":"2015","journal-title":"Indoor Built Environ."},{"key":"ref_29","unstructured":"Gaddis, J.L. (1997). Rethinking Cold War History, Oxford University Press."},{"key":"ref_30","unstructured":"Villa, V. (2016, January 3). Progressive energy retrofit for the educational building stock in a smart city. Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2011.131","article-title":"Building an integrated service management platform for ubiquitous cities","volume":"44","author":"Lee","year":"2011","journal-title":"Computer"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1007\/s00779-012-0583-5","article-title":"Taxonomy of ubiquitous computing service for city development","volume":"17","author":"Leem","year":"2013","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_33","first-page":"231","article-title":"\u2018Realities behind ICT Dreams\u2019 Designing a Ubiquitous City in a Living Lab Environment","volume":"4","author":"Ylipulli","year":"2012","journal-title":"Int. J. Gend. Sci. Technol."},{"key":"ref_34","unstructured":"(2020, November 13). What Determines Bluetooth Range?. Available online: https:\/\/www.bluetooth.com\/learn-about-bluetooth\/bluetooth-technology\/range\/."},{"key":"ref_35","unstructured":"Rouse, M. (2020, November 13). RFID (Radio Frequency Identification). Available online: https:\/\/internetofthingsagenda.techtarget.com\/definition\/RFID-radio-frequency-identification."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Wei, E.J.Y., and Chan, A.T.S. (2007). Towards Context-Awareness in Ubiquitous Computing. Embedded and Ubiquitous Computing 2007, Springer.","DOI":"10.1007\/978-3-540-77092-3_61"},{"key":"ref_37","unstructured":"(2020, November 13). The Important Difference between Virtual Reality, Augmented Reality and Mixed Reality. Available online: https:\/\/www.forbes.com\/sites\/bernardmarr\/2019\/07\/19\/the-important-difference-between-virtual-reality-augmented-reality-and-mixed-reality\/?sh=585ee3dc35d3."},{"key":"ref_38","unstructured":"Telstra (2020, November 13). ADSL2+, ADSL Plans. Available online: https:\/\/www.telstra.com.au\/internet\/adsl."},{"key":"ref_39","unstructured":"Beal, V. (2020, November 13). ADSL-Asymmetric Digital Subscriber Line. Available online: https:\/\/www.webopedia.com\/TERM\/A\/ADSL.html."},{"key":"ref_40","unstructured":"ICACT (2005, January 21\u201323). Broadband Convergence Network [BcN] for ubiquitous Korea vision. Proceedings of the 7th International Conference on Advanced Communication Technology, Phoenix Park, Korea."},{"key":"ref_41","unstructured":"(2020, November 13). FTTP vs. FTTN vs. FTTC: Connections to the National Broadband Network Explained, Aussie Broadband Blog. Available online: https:\/\/www.aussiebroadband.com.au\/blog\/fttp-vs-fttn-connections-national-broadband-network-explained\/."},{"key":"ref_42","unstructured":"(2020, November 13). A Brief History of GPRS, 3G, 4G and the Latest 5G Mobile Network Technology. Available online: https:\/\/www.raptorhub.com\/guides\/4g."},{"key":"ref_43","unstructured":"Evers, J. (2020, November 13). Encyclopedic Entry: GIS (Geographic Information System). National Geographic Society, Available online: https:\/\/www.nationalgeographic.org\/encyclopedia\/geographic-information-system-gis\/#:~:text=Ageographicinformationsystem."},{"key":"ref_44","unstructured":"Ferreira, R. (2019). White Paper: Where to Place the Frotcom GPS Terminal Inside a Vehicle, Frotcom."},{"key":"ref_45","unstructured":"NOAA (2020, November 14). What Is Remote Sensing?, Available online: https:\/\/oceanservice.noaa.gov\/facts\/remotesensing.html."},{"key":"ref_46","unstructured":"(2020, November 14). RADAR-Basics, Types & Applications. Available online: https:\/\/www.elprocus.com\/radar-basics-types-and-applications\/."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Lea, R., and Blackstock, M. (2015). City hub: A cloud-based IoT platform for smart cities. Proceedings of the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, 15\u201318 December 2014, IEEE.","DOI":"10.1109\/CloudCom.2014.65"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dcan.2017.04.005","article-title":"Middleware technologies for cloud of things: A survey","volume":"4","author":"Farahzadi","year":"2018","journal-title":"Digit. Commun. Netw."},{"key":"ref_49","unstructured":"Saxby, R. (2003). The Advancing Importance of System on a Chip Technology & Application. TechTarget, IET. Available online: https:\/\/search.ebscohost.com\/login.aspx?direct=true&AuthType=shib&db=cat06414a&AN=vic.b4585372&site=eds-live."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Botta, A., de Donato, W., Persico, V., and Pescap\u00e9, A. (2014, January 27\u201329). On the Integration of Cloud Computing and Internet of Things. Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, Barcelona, Spain.","DOI":"10.1109\/FiCloud.2014.14"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Bachani, M., Memon, A., and Shaikh, F.K. (2016). Sensors network: In regard with the security aspect and counter measures. Network Security Attacks and Countermeasures, IGI Global.","DOI":"10.4018\/978-1-4666-8761-5.ch006"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Kibirige, G.W., and Sanga, C.A. (2016). Attacks in wireless sensor networks. Network Security Attacks and Countermeasures, IGI Global.","DOI":"10.4018\/978-1-4666-8761-5.ch005"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1016\/j.procs.2020.03.282","article-title":"Distributed Denial of Service (DDoS) Attacks Detection System for OpenStack-based Private Cloud","volume":"167","author":"Virupakshar","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Al-Hababi, A., and Tokgoz, S.C. (2020, January 4\u20136). Man-in-the-Middle Attacks to Detect and Identify Services in Encrypted Network Flows using Machine Learning. Proceedings of the 2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet), Marrakech, Morocco.","DOI":"10.1109\/CommNet49926.2020.9199617"},{"key":"ref_55","unstructured":"Spitzner, L. (2020, November 16). Endpoint Protection-Symantec Enterprise. IP Spoofing: An Introduction. Available online: https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=9d18fc06-b229-4c4a-8ca5-7386d0870c01&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments."},{"key":"ref_56","unstructured":"(2020, November 16). The Difference between Phishing and Spear Phishing|PhishProtection.com. Available online: https:\/\/www.phishprotection.com\/content\/phishing-prevention\/difference-between-phishing-and-spear-phishing\/."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/S1361-3723(16)30083-5","article-title":"Beware the drive-by attack","volume":"2016","author":"Simmonds","year":"2016","journal-title":"Comput. Fraud Secur."},{"key":"ref_58","unstructured":"(2020, November 16). Password Attacks|Infosavvy Security and IT Management Training. Available online: https:\/\/info-savvy.com\/password-attacks\/."},{"key":"ref_59","unstructured":"Porup, J.M. (2020, November 16). What Is sql Injection? How SQLi Attacks Work and How to Prevent Them|CSO Online. Available online: https:\/\/www.csoonline.com\/article\/3257429\/what-is-sql-injection-how-these-attacks-work-and-how-to-prevent-them.html."},{"key":"ref_60","unstructured":"(2020, November 16). What Is a Cross-Site Scripting (XSS) Attack: Definition & Examples. Available online: https:\/\/www.ptsecurity.com\/ww-en\/analytics\/knowledge-base\/what-is-a-cross-site-scripting-xss-attack\/."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"York, D. (2010). Chapter 3\u2014Eavesdropping and Modification. Seven Deadliest Unified Communications Attacks, Elsevier.","DOI":"10.1016\/B978-1-59749-547-9.00003-X"},{"key":"ref_62","unstructured":"(2020, November 16). What Is a Birthday Attack and How to Prevent It?. Available online: https:\/\/www.internetsecurity.tips\/birthday-attack\/."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Patel, V., Choe, S., and Halabi, T. (2020, January 25\u201327). Predicting Future Malware Attacks on Cloud Systems using Machine Learning. Proceedings of the 2020 IEEE 6th International Conference on Big Data Security on Cloud, Baltimore, MD, USA.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00036"},{"key":"ref_64","unstructured":"(2020, November 16). GNSS Jammers and Its Impacts in Military Defense\u2014VisionSpace Blog. Available online: https:\/\/visionspace.blog\/blog\/2020\/2\/27\/gnss-jammers-and-its-impacts-in-military-defense."},{"key":"ref_65","unstructured":"(2020, November 17). Do Weather Conditions Affect GPS Accuracy?. Available online: https:\/\/www.frotcom.com\/blog\/2016\/11\/do-weather-conditions-affect-gps-accuracy."},{"key":"ref_66","first-page":"88","article-title":"National Seismic Network and Earthquake Activities in Egypt","volume":"7","author":"Sakr","year":"2007","journal-title":"Earthq. Hazards Mitig."},{"key":"ref_67","unstructured":"(2020, November 17). Surge and Lightning Damage to Electronics. Available online: https:\/\/strikecheck.com\/webinars\/surge-and-lightning-damage-to-electronics\/."},{"key":"ref_68","unstructured":"Carlos (2020, November 17). Can Solar Panels Be Damaged by Hail?. Available online: https:\/\/ecotality.com\/can-solar-panels-be-damaged-by-hail\/."},{"key":"ref_69","unstructured":"(2020, November 17). How Summer Heat Can Affect Your Internet. Available online: https:\/\/www.softcom.net\/how-summer-heat-can-affect-your-internet\/."},{"key":"ref_70","unstructured":"Hale, J. (2020, November 17). Can the Weather Affect Your Wi-Fi? Here\u2019s Why Your Internet Seems Slow When It\u2019s Gross Out. Available online: https:\/\/www.bustle.com\/p\/can-the-weather-affect-your-wi-fi-heres-why-your-internet-seems-slow-when-its-gross-out-9215741."},{"key":"ref_71","unstructured":"Byrd, D. (2020, November 18). Are Solar Storms Dangerous to Us?. Available online: https:\/\/earthsky.org\/space\/are-solar-storms-dangerous-to-us."},{"key":"ref_72","unstructured":"(2020, November 18). Tornadoes, Explained: Learn How These Deadly Storms Form and Wreak Havoc, and How You can Reduce Your Risk. National Geographic Society, Available online: https:\/\/www.nationalgeographic.com\/environment\/natural-disasters\/tornadoes\/."},{"key":"ref_73","unstructured":"Deziel, C. (2020, November 18). What Damage Do Tsunamis Cause?. Available online: https:\/\/sciencing.com\/tsunami-created-8747310.html."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"686","DOI":"10.3390\/rs70100686","article-title":"Monitoring groundwater variations from satellite gravimetry and hydrological models: A comparison with in-situ measurements in the mid-atlantic region of the United States","volume":"7","author":"Xiao","year":"2015","journal-title":"Remote Sens."},{"key":"ref_75","unstructured":"Tonkin, C. (2020, November 18). Telcos Scramble to Fix Networks during Bushfires. Available online: https:\/\/ia.acs.org.au\/article\/2020\/telcos-scramble-to-fix-rural-networks-during-bushfires.html."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"102437","DOI":"10.1016\/j.scs.2020.102437","article-title":"A holistic and multi-stakeholder methodology for vulnerability assessment of cities to flooding and extreme precipitation events","volume":"63","author":"Gandini","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.ecolind.2017.02.040","article-title":"Profiling urban vulnerabilities to climate change: An indicator-based vulnerability assessment for European cities","volume":"78","author":"Tapia","year":"2017","journal-title":"Ecol. Indic."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/s11069-019-03571-x","article-title":"Vulnerability assessment for flash floods using GIS spatial modeling and remotely sensed data in El-Arish City, North Sinai, Egypt","volume":"102","author":"Mohamed","year":"2020","journal-title":"Nat. Hazards"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/s11069-019-03766-2","article-title":"Climate change impact and vulnerability assessment of Mumbai city, India","volume":"102","author":"Murali","year":"2020","journal-title":"Nat. Hazards"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/s12665-020-09103-2","article-title":"Vulnerability assessment of cities to earthquake based on the catastrophe theory: A case study of Tabriz city, Iran","volume":"79","author":"Arouq","year":"2020","journal-title":"Environ. Earth Sci."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"2989","DOI":"10.1007\/s11069-020-04116-3","article-title":"Development of drought hazard index for vulnerability assessment in Pakistan","volume":"103","author":"Adnan","year":"2020","journal-title":"Nat. Hazards"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Alelaiwi, A. (2019). Evaluating distributed IoT databases for edge\/cloud platforms using the analytic hierarchy process. J. Parallel Distrib. Comput., 124.","DOI":"10.1016\/j.jpdc.2018.10.008"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Myeong, S., Jung, Y., and Lee, E. (2018). A study on determinant factors in smart city development: An analytic hierarchy process analysis. Sustainability, 10.","DOI":"10.3390\/su10082606"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Jnr, B.A. (2019). Validating the usability attributes of AHP-software risk prioritization model using partial least square-structural equation modeling. J. Sci. Technol. Policy Manag., 10.","DOI":"10.1108\/JSTPM-06-2018-0060"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1007\/s12524-019-01009-2","article-title":"Potential Landslide Vulnerability Zonation Using Integrated Analytic Hierarchy Process and GIS Technique of Upper Rangit Catchment Area, West Sikkim, India","volume":"47","author":"Pal","year":"2019","journal-title":"J. Indian Soc. Remote Sens."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Sami, G., Hadda, D., Mahdi, K., and Abdelwahhab, F. (2020). A Multi-criteria Analytical Hierarchy Process (AHP) to Flood Vulnerability Assessment in Batna Watershed (Algeria). Analele Univ. Oradea Ser. Geogr., 30.","DOI":"10.30892\/auog.301105-810"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1007\/s40808-017-0388-7","article-title":"Flood vulnerability analysis and risk assessment using analytical hierarchy process","volume":"3","author":"Dandapat","year":"2017","journal-title":"Model. Earth Syst. Environ."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s11069-018-3392-y","article-title":"Application of analytical hierarchy process (AHP) for flood risk assessment: A case study in Malda district of West Bengal, India","volume":"94","author":"Ghosh","year":"2018","journal-title":"Nat. Hazards"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1007\/s11069-018-03566-0","article-title":"GIS-based vulnerability mapping of the coastal stretch from Puri to Konark in Odisha using analytical hierarchy process","volume":"96","author":"Behera","year":"2019","journal-title":"Nat. Hazards"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Monjardin, C.E.F., Tan, F.J., Uy, F.A.A., Bale, F.J.P., Voluntad, E.O., and Batac, R.M.N. (2020, January 23\u201325). Assessment of the Existing Drainage System in Infanta, Quezon Province for Flood Hazard Management using Analytical Hierarchy Process. Proceedings of the 2020 IEEE Conference on Technologies for Sustainability (SusTech), Santa Ana, CA, USA.","DOI":"10.1109\/SusTech47890.2020.9150518"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","article-title":"Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks","volume":"4","author":"Abomhara","year":"2015","journal-title":"J. Cyber Secur. Mobil."},{"key":"ref_92","unstructured":"Hwang, Y.H. (, January April). IoT Security & Privacy: Threats and Challenges. Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, New York, NY, USA. Available online: https:\/\/dl.acm.org\/citation.cfm?id=2732216."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Kim, J., Choi, H., and Ryou, J. (2010, January 16\u201318). Countermeasures to Vulnerability of Certificate Application in u-City. Proceedings of the 2010 5th International Conference on Ubiquitous Information Technologies and Applications, Sanya, China.","DOI":"10.1109\/ICUT.2010.5677755"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Forsstr\u00f6m, S., Butun, I., Eldefrawy, M., Jennehag, U., and Gidlund, M. (2018, January 16\u201318). Challenges of Securing the Industrial Internet of Things Value Chain. Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, Brescia, Italy.","DOI":"10.1109\/METROI4.2018.8428344"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Yin, M., Wang, Q., and Cao, M. (2019, January 21\u201323). An Attack Vector Evaluation Method for Smart City Security Protection. Proceedings of the 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain.","DOI":"10.1109\/WiMOB.2019.8923576"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Kazemi, Z., Fazeli, M., Hely, D., and Beroulle, V. (2020, January 13\u201315). Hardware Security Vulnerability Assessment to Identify the Potential Risks in a Critical Embedded Application. Proceedings of the 2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), Napoli, Italy.","DOI":"10.1109\/IOLTS50870.2020.9159739"},{"key":"ref_97","unstructured":"Tariq, M.A.U.R., and van de Giesen, N.C. (2011). Risk-Based Planning and Optimization of Flood Management Measures in Developing Countries: Case Pakistan Volume. [Ph.D. Thesis, Delft University of Technology]."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Roy, U., and Majumder, M. (2016). Vulnerability of Watersheds to Climate Change Assessed by Neural Network and Analytical Hierarchy Process, Springer.","DOI":"10.1007\/978-981-287-344-6"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Bany Abdelnabi, A.A. (2019, January 3\u20135). An Analytical Hierarchical Process Model to Select Programming Language for Novice Programmers for Data Analytics Applications. Proceedings of the 2019 International Arab Conference on Information Technology (ACIT), Al Ain, UAE.","DOI":"10.1109\/ACIT47987.2019.8990995"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Alaneme, G.U., Ezeokpube, G.C., and Mbadike, E.M. (2020). Failure Analysis of a Partially Collapsed Building using Analytical Hierarchical Process. J. Fail. Anal. Prev., 1\u201312.","DOI":"10.1007\/s11668-020-01040-3"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/12\/235\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:47:52Z","timestamp":1760179672000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/12\/235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":100,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2020,12]]}},"alternative-id":["fi12120235"],"URL":"https:\/\/doi.org\/10.3390\/fi12120235","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2020,12,21]]}}}