Fig. 12From: Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacksPractical time consumption (seconds): (a) the result of Example 1, (b) the result of Example 2Back to article page