Research Article

Mathematical Approach to Security Risk Assessment

Table 1

Explanatory notes to the schemes.

Target object
Gate
R-gate
Fence
Path in the direction to target object
Path in the direction from target object