Research Article
[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
| Author, year | Proposed model | Average response time (ms) | Average churn | Modelcomplexity |
| Yousefpour et al., 2019 [10] | Framework for energy optimization | 200.50 | 7 | | Tomar and Shukla, 2019 [11] | Service based optimization | 172.31 | 6 | | Al-Salim et al., 2018 [13] | Service distribution | 387.62 | 6 | | Janarthanan et al., 2021 [16] | Priority routing | 257.76 | 7 | | Proposed framework, 2021 | Extreme coordinates identification, edge identification and optimal IoT device placements | 52.70 | 1 | |
|
|