Research Article

Mathematical Approach to Security Risk Assessment

Figure 6

Beta analysis, Path 1 (an example).