Research Article
On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication
Figure 2
The effectiveness of different attack methods. (a) Original network. (b) Optical method (5). (c) Degree-based method (7). (d) Betweenness-based method (7).
| (a) |
| (b) |
| (c) |
| (d) |