Research Article

G/M/1-Based DDoS Attack Mitigation in 5G Ultradense Cellular Networks

Figure 7

Relationship between edge nodes and user devices.
(a) UBL
(b) LBCO
(c) Improved -greedy
(d) TSNS
(e) MTOTC
(f) UCB