Research Article

An Invocation Chain Test and Evaluation Method for Fog Computing

Table 3

The probability of vulnerabilities being successfully exploited in each path.

Path numberPath description (%)

138.60
253.63
367.66
464.59
513.81
672.14
749.76