If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (firstname.lastname@example.org). We will work to respond to each request in as timely a manner as possible.
Now showing items 1-1 of 1
Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC
Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection ...