Research Article

Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus

Algorithm 1

Pseudocode for VSM algorithm.
Data: : Maximum number of validators to be selected
   : Percentage of most reputable validators
   : Percentage of less reputable validators
   
   : Validator performance matrix (equation (10))
Result: Create a pool of validators
(1)Construct a 2-dimensional plot with the average performance of each validator vs. the number of their overall validations;
(2)Identify the most performant clusters of validators;
(3)Select % of out of the most performant cluster/s;
(4)Select % of randomly out of the less performant cluster/s;
(5)Create the list of validators ,