If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact us at email@example.com. We will work to respond to each request in as timely a manner as possible.
Now showing items 1-3 of 3
Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection ...
Ieee Access Special Section Editorial: Recent Advances in Socially-Aware Mobile Networking
Mobile data traffic has been growing exponentially over the past few years. A report from Cisco shows that the mobile data traffic in 2014 grew 69 percent and was nearly 30 times the size of the entire global Internet ...
Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection
This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs ...