Research Article

Information Security Decisions with Consideration of Hacker Intrusion Propagation

Figure 8

(a) Curve of and . (b) Curve of and .
(a)
(b)