Research Article

[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT

Table 6

Comparative analysis.

Author, yearProposed modelAverage response time (ms)Average churnModelcomplexity

Yousefpour et al., 2019 [10]Framework for energy optimization200.507
Tomar and Shukla, 2019 [11]Service based optimization172.316
Al-Salim et al., 2018 [13]Service distribution387.626
Janarthanan et al., 2021 [16]Priority routing257.767
Proposed framework, 2021Extreme coordinates identification, edge identification and optimal IoT device placements52.701