Research Article

On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication

Figure 2

The effectiveness of different attack methods. (a) Original network. (b) Optical method (5). (c) Degree-based method (7). (d) Betweenness-based method (7).
(a)
(b)
(c)
(d)