Research Article

Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks

Table 2

Different machine’s specifications.

Input machineInput addressSpec of the input hardware

Virtual machine 11.193.168.20564-bit higher-end processor
Virtual machine 21.193.168.20664-bit higher-end processor
Virtual machine 31.193.168.20364-bit higher-end processor
Virtual machine 41.193.168.20464-bit higher-end processor