Research Article
A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing
Figure 11
The security performance of PoR-based CTI sharing model. (a) = 50, = 10, = 5. (b) = 50, = 10, = 15. (c) = 50, = 20, = 5. (d) = 50, = 20, = 15.
(a) |
(b) |
(c) |
(d) |