Research Article

Mathematical Approach to Security Risk Assessment

Figure 5

Alpha analysis, Path 2 (an example).