Fig. 7
From: Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies

Performance evaluation of basic, deterministic, arbitrary strategy, and MTDTM algorithm on the basis of service response time by (a) number of service requests (b) varying computing capacity of edge cloud (c) varying edge cloud storage capacity.