Research Article

A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing

Figure 5

Example threat proposal shared in the PoR consensus.