Research Article

Modeling the Effect of Spending on Cyber Security by Using Surplus Process

Figure 2

Total expected cyber cost with different .