Research Article
[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
| Node id | Received packets | Dumped packets | Lost packets |
| 1 | 0 | 0 | 0 | 2 | 5 | 0 | 0 | 3 | 2 | 0 | 0 | 4 | 3 | 0 | 0 | 5 | 4 | 0 | 0 | 6 | 5 | 0 | 0 | 7 | 4 | 0 | 0 | 8 | 4 | 0 | 0 | 9 | 3 | 0 | 0 | 10 | 5 | 0 | 0 | 11 | 4 | 0 | 0 | 12 | 3 | 0 | 0 | 13 | 3 | 0 | 0 | 14 | 4 | 0 | 0 | 15 | 4 | 0 | 0 | 16 | 4 | 0 | 0 | 17 | 5 | 0 | 0 | 18 | 4 | 0 | 0 | 19 | 3 | 0 | 0 | 20 | 3 | 0 | 0 | 21 | 4 | 0 | 0 | 22 | 4 | 0 | 0 | 23 | 5 | 0 | 0 | 24 | 5 | 0 | 0 | 25 | 4 | 0 | 0 |
|
|