[1. Bohanec, M. (2015), "DEXi: Program for Multi-Attribute Decision Making. User's Manual version 5.00 IJS DP-11897", available at: http://kt.ijs.si/MarkoBohanec/DEXi/html/DEXiDoc.htm (14 November 2017).]Search in Google Scholar
[2. Bohanec, M. (2017), "DEXi: A Program for Multi-Attribute Decision Making", available at: http://kt.ijs.si/MarkoBohanec/dexi.html (14 November 2017).]Search in Google Scholar
[3. Bohanec, M., Delibasic, B. (2015), "Data-Mining and Expert Models for Predicting Injury Risk in Ski Resorts", in Delibasic, B. et al. (Eds.), Decision Support Systems V - Big Data Analytics for Decision Making, Springer, Cham, pp. 46-60.10.1007/978-3-319-18533-0_5]Search in Google Scholar
[4. Bohanec, M., Znidarsic, M., Rajkovic, V., Bratko, I., Zupan, B. (2013), "DEX Methodology: Three Decades of Qualitative Multi-Attribute Modeling", Informatica, Vol. 37, No. 1, pp. 49-54.]Search in Google Scholar
[5. Chen, Y., Okudan, G. E., Riley, D. R. (2010), "Decision support for construction method selection in concrete buildings: Prefabrication adoption and optimization", Automation in Construction, Vol. 19, No. 6, pp. 665-675.10.1016/j.autcon.2010.02.011]Search in Google Scholar
[6. Erdogan, G., Refsdal, A. (2018), "A Method for Developing Qualitative Security Risk Assessment Algorithms", in Cuppens, N. et al. (Eds.), Risks and Security of Internet and Systems, Springer, Cham, pp. 244-259.10.1007/978-3-319-76687-4_17]Search in Google Scholar
[7. Fishburn, P. C. (1967), "Conjoint measurement in utility theory with incomplete product sets", Journal of Mathematical Psychology, Vol. 4, No. 1, pp. 104-119.10.1016/0022-2496(67)90043-0]Search in Google Scholar
[8. Fishburn, P. C., Keeney, R. L. (1974), "Seven independence concepts and continuous multiattribute utility functions", Journal of Mathematical Psychology, Vol. 11, No. 3, pp. 294-327.10.1016/0022-2496(74)90024-8]Search in Google Scholar
[9. Keeney, R. L. (1977), "The art of assessing multiattribute utility functions", Organizational Behavior and Human Performance, Vol. 19, No. 2, pp. 267-310.10.1016/0030-5073(77)90065-4]Search in Google Scholar
[10. Konidari, P., Mavrakis, D. (2007), "A multi-criteria evaluation method for climate change mitigation policy instruments", Energy Policy, Vol. 35, No. 12, pp. 6235-6257.10.1016/j.enpol.2007.07.007]Search in Google Scholar
[11. Lund, M. S., Solhaug, B., Stølen, K. (2011), “Model-Driven Risk Analysis: The CORAS Approach”, Springer, Berlin, Heidelberg.10.1007/978-3-642-12323-8]Search in Google Scholar
[12. Omercevic, D., Zupancic, M., Bohanec, M., Kastelic, T. (2008), "Intelligent response to highway traffic situations and road incidents", in Transport Research Arena Europe 2008, Ljubljana, pp. 21-24.]Search in Google Scholar
[13. Refsdal, A., Erdogan, G. (2017), "D3.4 Cyber risk modelling language and guidelines", available at: https://www.cyberwiser.eu/ (14 November 2017).]Search in Google Scholar
[14. Saaty, T. L. (1980), “The analytic hierarchy process: planning, priority setting, resources allocation”, McGraw-Hill, New York.]Search in Google Scholar
[15. Saaty, T. L. (2008), "Decision making with the analytic hierarchy process", International Journal of Services Sciences, Vol. 1, No. 1, pp. 83-98.10.1504/IJSSCI.2008.017590]Search in Google Scholar
[16. Velasquez, M., Hester, P. T. (2013), "An analysis of multi-criteria decision making methods", International Journal of Operations Research, Vol. 10, No. 2, pp. 56-66.]Search in Google Scholar
[17. WISER (2017), "Wide-Impact cyber SEcurity Risk framework", available at: https://www.cyberwiser.eu/ (14 November 2017).]Search in Google Scholar