Fig. 6From: Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacksThe workload distribution evolution obtained from Example 1, where (a) to (j) show the workload dynamics of servers \(s_{1},s_{2},\dots,s_{10}\) in orderBack to article page