Fig. 8From: Fog computing network security based on resources managementComparison of system execution timeBack to article page