Mathematical modeling of adaptive information security strategies using composite behavior models
Crossref DOI link: https://doi.org/10.1038/s41598-026-45315-5
Published Online: 2026-03-28
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Nuaim, Ahmed Al
Nuaim, Abdullah Al
Nadeem, Mohd
Agrawal, Alka
Text and Data Mining valid from 2026-03-28
Version of Record valid from 2026-03-31
Article History
Received: 5 January 2026
Accepted: 18 March 2026
First Online: 28 March 2026
Declarations
:
: The authors declare no competing interests.