Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Figure 8

Comparisons between total processing delay and total CPU usage for different cases.
(a) Total processing delay different cases
(b) Total CPU usage for different cases