Research Article

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Figure 9

Comparison of the time overhead of algorithm.