[54/2014. (XII. 5.) BM Decree on the National Fire Protection Regulations (2014). Budapest: National Legislation.]Search in Google Scholar
[Berek, L. (2014). Security Systems. Budapest: National University of Public Service.]Search in Google Scholar
[Bunyitai, A. (2011). Location and role of access control systems in asset protection. Budapest: Hadmernok, VI.(4.), 17-25.]Search in Google Scholar
[Fishwick, P. A., & Hyungwook, P. (2008). Queue Modeling and Simulation. In Principles of Modeling and Simulation: A Multidisciplinary Approach. New Jersey, USA: John Wiley & Sons, Inc.]Search in Google Scholar
[Hanka, L. (2013). Applications for using binomial distribution in functioning identification systems, the application of maximum likelihood principle. Spring Technical Symposium, Budapest, Hungary: University of Obuda.]Search in Google Scholar
[Hanka, L., & Werner, G. (2015). Using the Beta-Binomial Distribution for the Analysis of Biometric Identification. 13th International Symposium on Intelligent Systems and Informatics: Proceedings, 209-216, Subotica, Serbia.10.1109/SISY.2015.7325381]Search in Google Scholar
[Hillier, F. S., & Lieberman, G. J. (2014). Introduction to Operations Research. New York, USA: McGraw-Hill Higher Education.]Search in Google Scholar
[Hungarian Standards Institution. (2015). MSZ EN 60839-11-2:2015. Alarm systems and electronic security systems. Part 11-2.: Electronic access control systems. Application Guidelines. Budapest: Hungarian Standards Institution.]Search in Google Scholar
[Kendall, D. G. (1953). Stochastic processes occurring in the theory of queues and their analysis by the method of imbedded Markov chain. Annals of Mathematical Statistics, Vol. 24, Issue 3, 338-354.10.1214/aoms/1177728975]Search in Google Scholar
[Kleinrock, L. (1975). Queueing Systems Volume 1: Theory. New York: Wiley - Interscience.]Search in Google Scholar
[Law, A. M. (2015). Simulation Modeling and Analysis. 5th Edition. Tucson, Arizona, USA: McGrow-Hill.]Search in Google Scholar
[Little, J. D. (1961). A proof of the queuing formula: l = λw. Operations Research, Vol. 9(3), pp. 383-387, available at: http://fisherp.scripts.mit.edu/wordpress/wp-content/uploads/2015/11/ContentServer.pdf10.1287/opre.9.3.383]Search in Google Scholar
[Lovász, L. (2009). Complexity of Algorithms. Budapest: ELTE, Institute of Mathematics.]Search in Google Scholar
[Lukács, J. (2014). Develop and present an access gate placement strategy through a few selected subway stations. Budapest: BME Budapest University of Technology and Economics.]Search in Google Scholar
[Otti, C. (2015). Classification of biometric access control systems based on real-time throughput. Proceedings of Fifth International Scientific Videoconference of Scientists and PhD. students or candidates, Bratislava, 63-71.]Search in Google Scholar
[Otti, C. (2016). Biometric Systems User Pattern Positioning Issues. DOSZ, Spring Wind Conference, 251-260, Budapest.]Search in Google Scholar
[Pap, G., & Szűcs, G. (2014). Stochastic processes. Szeged, Hungary: STE Institution of Bolyai, Stochastic Department.]Search in Google Scholar
[Pokorádi, L. (2008). Modeling of systems and processes. Debrecen, Hungary: Campus Kiado.]Search in Google Scholar
[Szeidl, L. (2009). Mass Service. Budapest, Hungary: University of Obuda, Institute of Informatics.]Search in Google Scholar
[Sztrik, J. (2011). Basics of queuing theory. Debrecen, Hungary: University of Debrecen.]Search in Google Scholar