Research Article

A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing

Figure 11

The security performance of PoR-based CTI sharing model. (a)  = 50,  = 10,  = 5. (b)  = 50,  = 10,  = 15. (c)  = 50,  = 20,  = 5. (d)  = 50,  = 20,  = 15.
(a)
(b)
(c)
(d)