Research Article

Modeling the Effect of Spending on Cyber Security by Using Surplus Process

Figure 3

Expected number of breaches with different attack arrivals.