Fig. 10From: Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computingthe execution times for EHIDS, CF-OSELM-PRFF, ABA-IDS, and ICNN-FCID with different sample sizes (UNSW-NB15 data set)Back to article page