Research Article

An Invocation Chain Test and Evaluation Method for Fog Computing

Figure 4

Construction of invocation chain based on the attack graph.