Research Article
Internal Resource Allocation to Information Security of Smart Cities Using Evolutionary Game Model
Figure 3
Changes in the expected loss with and . In this figure, x axis denotes the probabilities that cities are invaded by illegal users when no funds are invested in the data influencing information security (), y axis denotes the probabilities that cities are invaded by illegal users when no funds are invested in the application software influencing information security (), and z axis denotes expected loss of smart cities.