Research Article

Mathematical Approach to Security Risk Assessment

Figure 7

Beta analysis, Path 2 (an example).