Fig. 5From: Fog computing network security based on resources managementUsed neural networkBack to article page