Fig. 2From: Security-Aware computation offloading for Mobile edge computing-Enabled smart cityCrossover operationBack to article page