Research Article
On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication
Figure 2
The effectiveness of different attack methods. (a) Original network. (b) Optical method (5). (c) Degree-based method (7). (d) Betweenness-based method (7).
(a) |
(b) |
(c) |
(d) |