[1] Jabbarzadeh, M. Haughton, and A. Khosrojerdi, "Closed-loop supply chain network design under disruption risks: A robust approach with real world application," Computers & Industrial Engineering, vol. 116, pp. 178-191, 2018.
[2] D. Simchi-Levi, P. Kaminsky, and E. Simchi-Levi, Managing The Supply Chain: Definitive Guide. Tata McGraw-Hill Education, 2004.
[3] H. Carvalho, S. G. Azevedo, and V. Cruz-Machado, "Agile and resilient approaches to supply chain management: influence on performance and competitiveness," Logistics research, vol. 4, no. 1-2, pp. 49-62, 2012a.
[4] H. Carvalho, V. Cruz-Machado, and J. G. Tavares, "A mapping framework for assessing supply chain resilience," International Journal of Logistics Systems and Management, vol. 12, no. 3, pp. 354-373, 2012b.
[5] Y. Sheffi, J. B. Rice, J. M. Fleck, and F. Caniato, "Supply chain response to global terrorism: a situation scan," in Center for Transportation and Logistics, MIT, Department of Management, Economics and Industrial Engineering, Politecnico di Milano, EurOMA POMS Joint International Conference, 2003.
[6] R. Rajesh and V. Ravi, "Supplier selection in resilient supply chains: a grey relational analysis approach," Journal of Cleaner Production, vol. 86, pp. 343-359, 2015.
[7] S. Derissen, M. F. Quaas, and S. Baumgärtner, "The relationship between resilience and sustainability of ecological-economic systems," Ecological Economics, vol. 70, no. 6, pp. 1121-1128, 2011/04/15/ 2011.
[8] M. Varsei and S. Polyakovskiy, "Sustainable supply chain network design: A case of the wine industry in Australia," Omega, vol. 66, pp. 236-247, 2017.
[9] S. Derissen, M. F. Quaas, and S. Baumgärtner, "The relationship between resilience and sustainability of ecological-economic systems," Ecological Economics, vol. 70, no. 6, pp. 1121-1128, 2011/04/15/ 2011.
[10] R. Babazadeh, J. Razmi, M. S. Pishvaee, and M. Rabbani, "A sustainable second-generation biodiesel supply chain network design problem under risk," Omega, vol. 66, pp. 258-277, 2017.
[11] M. Varsei and S. Polyakovskiy, "Sustainable supply chain network design: A case of the wine industry in Australia," Omega, vol. 66, pp. 236-247, 2017.
[12] H. Baroud, K. Barker, J. E. Ramirez‐Marquez, and C. M. Rocco, "Inherent costs and interdependent impacts of infrastructure network resilience," Risk Analysis, vol. 35, no. 4, pp. 642, 66-2015.
[13] V. Gupta, B. He, and S. P. Sethi, "Contingent sourcing under supply disruption and competition," International Journal of Production Research, vol. 53, no. 10, pp. 3006-3027, 2015.
[14] W. Ho, T. Zheng, H. Yildiz, and S. Talluri, "Supply chain risk management: a literature review," International Journal of Production Research, vol. 53, no. 16, pp. 5031-5069, 2015.
[15] S. Rezapour, R. Z. Farahani, and M. Pourakbar, "Resilient supply chain network design under competition: a case study," European Journal of Operational Research, vol. 259, no. 3, pp. 1017-1035, 2017.
[16] B. Fahimnia and A. Jabbarzadeh, "Marrying supply chain sustainability and resilience: A match made in heaven," Transportation Research Part E: Logistics and Transportation Review, vol. 91, pp. 306-324, 2016.
[17] Zahiri, B., Zhuang, J., & Mohammadi, M. Toward an integrated sustainable-resilient supply chain: A pharmaceutical case study. Transportation Research Part E: Logistics and Transportation Review, 103, 109-142, 2017.
[18] D. Ivanov, "Revealing interfaces of supply chain resilience and sustainability: a simulation study," International Journal of Production Research, vol. 56, no. 10, pp. 3507-3523, 2018.
[19] A. Jabbarzadeh, B. Fahimnia, and F. Sabouhi, "Resilient and sustainable supply chain design: sustainability analysis under disruption risks," International Journal of Production Research, pp. 24-1, 2018.
[20] G. Mavrotas, "Effective implementation of the ε-constraint method in multi-objective mathematical programming problems," Applied mathematics and computation, vol. 213, no. 2, pp. 455-465,2009.
[21] J. Aghaei, N. Amjady, and H. A. Shayanfar, "Multi-objective electricity market clearing considering dynamic security by lexicographic optimization and augmented epsilon constraint method," Applied Soft Computing, vol. 11, no. 4, pp. 3858-3846, 2011.