Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Figure 6

The acceptable level with different CPU usage and processing delay.