Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Figure 3

The workflow of a firewall with the security service proxy.