Research Article

Modeling the Effect of Spending on Cyber Security by Using Surplus Process

Figure 4

Total expected cyber cost with different attack arrivals.