Research Article

Modeling the Effect of Spending on Cyber Security by Using Surplus Process

Figure 1

Security process.