Comparison and refinement of two EMS-98 derived vulnerability methods: towards a unique definition