Research Article

Modeling the Effect of Spending on Cyber Security by Using Surplus Process

Figure 6

Total expected cyber cost with different .