Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Figure 10

Comparing the execution time of different security service composition algorithms.