Research Article
Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing
Figure 8
Comparisons between total processing delay and total CPU usage for different cases.
(a) Total processing delay different cases |
(b) Total CPU usage for different cases |