Fig. 4From: A security event description of intelligent applications in edge-cloud environmentExperimental edge-cloud environment topologyBack to article page