Research Article
[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
| Node id | Number of hops | Extra time (ms) |
| 1 | 0 | 0.0 | 2 | 1 | 1.0 | 3 | 1 | 1.1 | 4 | 2 | 1.0 | 5 | 3 | 1.3 | 6 | 2 | 1.5 | 7 | 2 | 1.0 | 8 | 2 | 4.8 | 9 | 3 | 1.2 | 10 | 2 | 1.0 | 11 | 4 | 1.0 | 12 | 5 | 1.1 | 13 | 3 | 1.1 | 14 | 4 | 1.0 | 15 | 3 | 1.2 | 16 | 4 | 1.1 | 17 | 3 | 1.5 | 18 | 4 | 1.1 | 19 | 5 | 1.2 | 20 | 4 | 1.9 | 21 | 5 | 1.2 | 22 | 6 | 0.6 | 23 | 5 | 0.8 | 24 | 5 | 1.4 | 25 | 6 | 4.8 |
|
|