Fig. 3From: Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacksDiagram of the topological structure of the distributed edge computing systemBack to article page