Anderson, S., De Palma, A. and Thisse, J. (1992). DiscreteChoice Theory of Product Differentiation,MIT Press, Boston, MA.10.7551/mitpress/2450.001.0001
Baudrit, C., Dubois, D. and Guyonnet, D. (2006). Joint propagation and exploitation of probabilistic and possibilistic information in risk assessment, IEEETransactions on Fuzzy Systems 14(5): 593-608.10.1109/TFUZZ.2006.876720
Bowles, J.B. and Wan, C. (2001). Software failure modes and effects analysis for a small embedded control system, Proceedings of the Annual Reliability and MaintainabilitySymposium, Philadelphia, PA, USA, pp. 1-6.
Cervesato, I. and Meadows, C. (2003). Fault-tree representation of NPATRL security requirements, Proceedings of the 3rdWorkshop on Issues in the Theory of Security, Warsaw,Poland, pp. 1-10.
Chiang, F. and Braun, R. (2007). Self-adaptability and vulnerability assessment of secure autonomic communication networks, Proceedings of the 10thAsia-Pacific Conference on Network Operations andManagement Symposium: Managing Next GenerationNetworks and Services, APNOMS’07, Sapporo, Japan, pp. 112-122.
Craft, R., Vandewart, R., Wyss, G. and Funkhouser, D. (1998). An open framework for risk management 1, 21st NationalInformation Systems Security Conference, Arlington, VA,USA.
Eom, J.-H., Park, S.-H., Han, Y.-J. and Chung, T.-M. (2007). Risk assessment method based on business process-oriented asset evaluation for information system security, Proceedings of the 7th International Conferenceon Computational Science, Beijing, China, pp. 1024-1031.
Han, Y.-J., Yang, J.S., Chang, B.H., Na, J.C. and Chung, T.-M. (2004). The vulnerability assessment for active networks: Model, policy, procedures, and performance evaluations, in A. Laganà, M.L. Gavrilova, V. Kumar, Y. Mun, C.J.K. Tan and O. Geruasi (Eds.), ICCSA (1), Lecture Notes in Computer Science, Vol. 3034, Springer, Berlin/Heidelberg, pp. 191-198.10.1007/978-3-540-24707-4_24
Hubbard, D. and Evans, D. (2010). Problems with scoring methods and ordinal scales in risk assessment, Journal ofResearch and Development 54(3): 1-10.10.1147/JRD.2010.2042914
Institute for Computer Sciences and Technology (1979). Guidelinefor Automatic Data Processing Risk Analysis, National Bureau of Standards, Washington, DC.
Jetter, A. and Schweinfort, W. (2011). Building scenarios with fuzzy cognitive maps: An exploratory study of solar energy, Futures 43(1): 52-66.10.1016/j.futures.2010.05.002
Kobylarz, D. and Danda, J. (2013). A common interface for bluetooth-based health monitoring devices, 29th SouthernBiomedical Engineering Conference (SBEC), Ho ChiMinhCity, Vietnam, pp. 153-154.
Lazzerini, B. and Mkrtchyan, L. (2011). Analyzing risk impact factors using extended fuzzy cognitive maps, IEEE SystemsJournal 5(2): 288-297.10.1109/JSYST.2011.2134730
Maglogiannis, I., Zafiropoulos, E., Platis, A. and Lambrinoudakis, C. (2006). Risk analysis of a patient monitoring system using Bayesian network modeling, Journal of Biomedical Informatics 39(6): 637-647.10.1016/j.jbi.2005.10.00316337837
Mikulik, J. and Zajdel, M. (2009). Automatic risk control based on FSA methodology adaptation for safety assessment in intelligent buildings, International Journal of AppliedMathematics and Computer Science 19(2): 317-326, DOI: 10.2478/v10006-009-0027-1.10.2478/v10006-009-0027-1
Ozesmi, U. Ozesmi, S. (2004). Ecological models based on people’s knowledge: A multi-step fuzzy cognitive mapping approach, Ecological Modelling 176(1-2): 43-64.10.1016/j.ecolmodel.2003.10.027
Stathiakis, N., Chronaki, C., Skipenes, E., Henriksen, E., Charalambus, E., Sykianakis, A., Vrouchos, G., Antonakis, N., Tsiknakis, M. and Orphanoudakis, S. (2003). Risk assessment of a cardiology ehealth service in HYGEIAnet, Computers in Cardiology (CIC’2003), Cambridge,MA, USA, pp. 201-204.
Sun, L., Srivastava, R.P. and Mock, T.J. (2006). An information systems security risk assessment model under the Dempster-Shafer theory of belief functions, Journal ofManagement Information Systems 22(4): 109-142.10.2753/MIS0742-1222220405
Szpyrka, M., Jasiul, B., Wrona, K. and Dziedzic, F. (2013). Telecommunications networks risk assessment with Bayesian networks, in K. Saeed, R. Chaki, A. Cortesi and S.T.Wierzchon (Eds.), Computer Information Systemsand Industrial Management, Lecture Notes in Computer Sience, Vol. 8104, Springer-Verlag, Berlin, pp. 277-288.10.1007/978-3-642-40925-7_26
Szwed, P. (2013). Application of fuzzy ontological reasoning in an implementation of medical guidelines, 6th InternationalConference on Human System Interaction (HSI), Sopot,Poland, pp. 342-349.
Szwed, P., Skrzynski, P. and Grodniewicz, P. (2013). Risk assessment for SWOP telemonitoring system based on fuzzy cognitive maps, in A. Dziech and A. Czy˙zewski (Eds.), Multimedia Communications, Services and Security, Communications in Computer and Information Science, Vol. 368, Springer, Berlin/Heidelberg, pp. 233-247.10.1007/978-3-642-38559-9_21
Wang Y., Zhu, A. and Zhang, J. (2011). Research on and application of the analyzing method of network security based on security case reasoning, International Conferenceon Control, Automation and Systems Engineering (CASE),Tokyo, Japan, pp. 1-4.
Zhuang, Y., Li, X., Xu, B. and Zhou, B. (2009). Information security risk assessment based on artificial immune danger theory, Proceedings of the 2009 4th International Multi-Conference on Computing in the Global Information Technology,ICCGI’09, Cannes, France, pp. 169-174.