Research Article

Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT

Figure 6

The change of the optimal strategy of the defenders with and .