Research Article

A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

Figure 2

Intrusion process in fog computing.