Research Article

An Invocation Chain Test and Evaluation Method for Fog Computing

Figure 6

The test instance of invocation chain based on the attack graph.