[1. Landoll, D. (2006). The Security Risk Assesment Handbook. New York: Auerbach Publication.]Search in Google Scholar
[2. Wang, P, Da Ruan, Kerre E. (2007). Fuzzy Logic A Spectrum of Theoretical & Practical Issues. Berlin: Springer.10.1007/978-3-540-71258-9]Search in Google Scholar
[3. Jang, R., Gulley, N. (1997). Fuzzy Logic Toolbox User's Guide. Natick, Massachusetts: The MathWorks, Inc.]Search in Google Scholar
[4. Chavas, Jean-Paul. (2004). Risk analysis in theory and practice. London: Elsevier Academic Press.]Search in Google Scholar
[5. Da Ruan. (2000). Fuzzy Sets and Fuzzy Information. Key Selected Papers by Lofti A. Zadeh. Bejing: Bejing Normal University Press.]Search in Google Scholar
[6. Mcneill, M., Ellen, T. (1994). Fuzzy Logic, a Practical Approach. London: Academic Press.]Search in Google Scholar
[7. Peltier, Thomas R. (2005). Information security risk analysis. Boca Raton: CRC Press.10.1201/9781420031195]Search in Google Scholar
[8. Carr, V., Tah, J. H. M. (2001). A fuzzy approach to construction project risk assessment andanalysis: construction project risk management system. London: Advances in Engineering Software.]Search in Google Scholar
[9. Department of the Army, USA. (2001). FM 3-19.30: Physical Security, Headquarters. Department of the Army, USA.]Search in Google Scholar
[10. Bojadziev, G., Bojadziev, M. (2007). Fuzzy Logic for Business, Finance and Management. Singapore: World Scientific Publishing.10.1142/6451]Search in Google Scholar