Research Article

Internal Resource Allocation to Information Security of Smart Cities Using Evolutionary Game Model

Figure 3

Changes in the expected loss with and . In this figure, x axis denotes the probabilities that cities are invaded by illegal users when no funds are invested in the data influencing information security (), y axis denotes the probabilities that cities are invaded by illegal users when no funds are invested in the application software influencing information security (), and z axis denotes expected loss of smart cities.