Fig. 11From: A security event description of intelligent applications in edge-cloud environmentCOP model with attack probabilityBack to article page