Research Article

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

Figure 1

Security reference model of TTAK.KO-12.0307 [13].