“…In the literature, scholars have studied CIS vulnerability under different types of disruptive events, including (1) random failures, which are modeled by randomly selecting a certain fraction of system components to make them fail (Motter and Lai, ; Crucitti et al., ; Albert et al., ; Yazdani and Jeffrey, ; Dobson et al., ; Ouyang and Dueñas‐Osorio, ; Carreras et al., ; Dobson et al., ; Ren and Dobson, ; Ouyang et al., ; Newman, ; Hong et al., ); (2) natural hazards, whose scenarios are simulated by hazard generation models (FEMA, ) and their impacts on system components are described by fragility curves (Dueñas‐Osorio et al., ; Adachi and Ellingwood, ; Esposito et al., ; Franchin and Cavalieri, ; Cavallaro et al., ; FEMA, ; Ouyang and Dueñas‐Osorio, ); (3) malicious attacks, which are simulated by removing important components (Hines et al., ; Holmgren, ; Rosas‐Casals et al., ; Holme et al., ; Bompard et al., ; Mishkovski et al., ; Zio et al., ; Alderson et al., ; Ouyang et al., ; Wang et al., ; Afshari Rad and Kakhki, ; Hasani and Khosrojerdi, ; Newell, ; Bogloee et al. ); and (4) some combinations of the above events (Levitin and Hausken, ; Levitin, ; Miller‐Hooks et al., ).…”