Research Article

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Figure 8

Comparison of the maximum security service latency.