Research Article
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process
Table 5
AHP result of hierarchy II on the control layer.
| Hierarchy I | Hierarchy II | Importance | Priority | C.I. |
| Network robustness | Fuzzing test | 0.510 | 1 | 0.00 | Stress test | 0.490 | 2 |
| Service continuity | Resource availability | 0.336 | 2 | 0.02 | Physical interface protection | 0.362 | 1 | Event response | 0.302 | 3 |
| Security functions | Security audit | 0.123 | 5 | 0.04 | Identification authentication access control | 0.256 | 1 | Data protection | 0.203 | 4 | Security function management | 0.203 | 3 | State management | 0.215 | 2 |
|
|
The highest priority of each hierarchy on the control layer is shown in bold.
|