Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Figure 9

Comparisons of the IGD values of different security service composition algorithms.