Research Article

Mathematical Approach to Security Risk Assessment

Figure 3

Schematic placement of the target object and its security features.