Critical Nodes - Watson Project

[...] Then, the frequency of perceived vulnerability levels for each key element is determined using the following formula: