Mimic Defense Techniques of Edge-Computing Terminal | IEEE Conference Publication | IEEE Xplore