Research Article

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Figure 7

Comparison of the maximum resource fragmentation.