Research Article
[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
| Node id | Response time |
| 1 | 0.0 | 2 | 8.2 | 3 | 8.5 | 4 | 16.0 | 5 | 56.0 | 6 | 19.6 | 7 | 17.3 | 8 | 76.3 | 9 | 26.7 | 10 | 16.6 | 11 | 34.5 | 12 | 46.0 | 13 | 26.0 | 14 | 69.5 | 15 | 26.3 | 16 | 34.5 | 17 | 27.6 | 18 | 35.8 | 19 | 43.7 | 20 | 47.0 | 21 | 53.3 | 22 | 280.5 | 23 | 187.4 | 24 | 71.6 | 25 | 87.8 |
|
|