Research Article

Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Figure 3

Fog network/MEC network intrusion detection scheme.