Research Article
[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
| Node id | Number of churns | Beacon interval (ms) | Number ofreboots |
| 1 | 0 | 0 | 0 | 2 | 0 | 102400 | 0 | 3 | 0 | 96000 | 0 | 4 | 0 | 138666 | 0 | 5 | 2 | 28000 | 0 | 6 | 0 | 92800 | 0 | 7 | 0 | 96000 | 0 | 8 | 0 | 82000 | 0 | 9 | 0 | 69333 | 0 | 10 | 0 | 140800 | 0 | 11 | 0 | 74000 | 0 | 12 | 1 | 64000 | 0 | 13 | 0 | 69333 | 0 | 14 | 0 | 58000 | 0 | 15 | 0 | 80000 | 0 | 16 | 0 | 96000 | 0 | 17 | 0 | 83200 | 0 | 18 | 0 | 84000 | 0 | 19 | 0 | 149333 | 0 | 20 | 0 | 64000 | 0 | 21 | 0 | 88000 | 0 | 22 | 1 | 88000 | 0 | 23 | 1 | 96000 | 0 | 24 | 0 | 108800 | 0 | 25 | 0 | 73000 | 0 |
|
|