If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact us at email@example.com. We will work to respond to each request in as timely a manner as possible.
Now showing items 1-2 of 2
Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection ...
Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection
This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs ...