Tag: resource constraints in cybersecurity