Fig. 6From: Security-Aware computation offloading for Mobile edge computing-Enabled smart cityComparison of average resource utilizationBack to article page