“…The mainstream methods for studying vulnerability include hierarchical analysis (AHP) [15], data envelopment analysis (DEA) [2,16], analytic network process (ANP) [17], (Technique for Order Preference by Similarity to an Ideal Solution) TOPSIS [18] model, ISM [15,19], DEMATEL [15,19], BWM [20] methods and so on. However, previous studies were unable to analyze in depth the relationship between various factors affecting vulnerability, and the process of determining the "vulnerability point" was too complicated.…”