Fig. 6
From: Security-Aware computation offloading for Mobile edge computing-Enabled smart city

Comparison of average resource utilization
From: Security-Aware computation offloading for Mobile edge computing-Enabled smart city
Comparison of average resource utilization