Fig. 12
From: Mathematical modeling of adaptive information security strategies using composite behavior models

Resource utilization vs. false positive rate tradeoff.
From: Mathematical modeling of adaptive information security strategies using composite behavior models

Resource utilization vs. false positive rate tradeoff.