Fig. 8From: Optimal cloud assistance policy of end-edge-cloud ecosystem for mitigating edge distributed denial of service attacksThe optimal policy obtained from Example 2, where (a) to (j) show the elements \(u_{1}(t),u_{2}(t),\dots,u_{10}(t)\) in orderBack to article page