Research Article

Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks

Table 3

Input specification of virtual machine.

Input machineInput addressSpec of the input hardware

Virtual machine 11.193.168.20164-bit higher-end processor
Virtual machine 21.193.168.20264-bit higher-end processor
Virtual machine 31.193.168.20364-bit higher-end processor
Virtual machine 41.193.168.20464-bit higher-end processor