SEARCH Articles Figures Tables Accidents vulnerability analysis Common Mode Analysis vulnerabilities Risk and vulnerability analysis Security Vulnerability Analysis Site vulnerability analysis Vulnerability Vulnerability analysis frequency Vulnerability analysis overview