file_b4qpvdh72nhatgltc25sqoeojy

Associated Releases

2020-10-13 Review of different methods and techniques used for flood vulnerability analysis
unknown status | post | CC-BY
doi:10.5194/nhess-2020-297

Public Access URLs

publisher https://nhess.copernicus.org/preprints/nhess-2020-297/nhess-2020-297.pdf
webarchive https://web.archive.org/web/20201018093427/https://nhess.copernicus.org/preprints/nhess-2020-297/nhess-2020-297.pdf

Data Integrity Checksums

SHA-1 9a54a18ea1550dd30ca968f1c8d5b05cad5593d4
SHA-256 9eb0e5cddc9f0dde56c3145fbfa5f52d686459481423e1393c26b6455b7c33e4
MD5 f95ff1e68cbfdebd4b7f19d5db4a728c
View Archived File
Size  717.5 kB
MIME Type  application/pdf
Catalog Record
Revision: c75d86a6-ac76-47b1-a2fc-003f941713e2
API URL: JSON