Now showing items 1-3 of 3
Ieee Access Special Section Editorial: Recent Advances in Socially-Aware Mobile Networking
Mobile data traffic has been growing exponentially over the past few years. A report from Cisco shows that the mobile data traffic in 2014 grew 69 percent and was nearly 30 times the size of the entire global Internet ...
Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection ...
Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection
This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs ...