Research Article

Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT

Figure 5

The change of the optimal strategy of the attackers with and .