Research Article
Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing
Table 1
Service state list.
| Flow ID | Matching info | Service state |
| 1 | (src_ip1, dst_ip1, protocol1, src_port1, dst_port1) | STATE1 | 2 | (src_ip2, dst_ip2, protocol2, src_port2, dst_port2) | STATE2 |
|
|