Research Article

[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT

Table 1

Coverage analysis.

Node idReceived packetsDumped packetsLost packets

1000
2500
3200
4300
5400
6500
7400
8400
9300
10500
11400
12300
13300
14400
15400
16400
17500
18400
19300
20300
21400
22400
23500
24500
25400