Research Article

Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC

Figure 6

Training time comparison of SS-ELM, ELM, and SVM.