Research Article

A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

Figure 4

Attack strategy and response strategy in fog computing.