Journals
Publish with us
Publishing partnerships
About us
Blog
Wireless Communications and Mobile Computing
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Wireless Communications and Mobile Computing
/
2022
/
Article
/
Tab 3
/
Research Article
Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks
Table 3
Input specification of virtual machine.
Input machine
Input address
Spec of the input hardware
Virtual machine 1
1.193.168.201
64-bit higher-end processor
Virtual machine 2
1.193.168.202
64-bit higher-end processor
Virtual machine 3
1.193.168.203
64-bit higher-end processor
Virtual machine 4
1.193.168.204
64-bit higher-end processor