Research Article

A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

Figure 7

The optimal intrusion strategy when 5 fog nodes are invaded.