Research Article
Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus
Algorithm 1
Pseudocode for VSM algorithm.
| Data: : Maximum number of validators to be selected | | : Percentage of most reputable validators | | : Percentage of less reputable validators | | | | : Validator performance matrix (equation (10)) | | Result: Create a pool of validators | (1) | Construct a 2-dimensional plot with the average performance of each validator vs. the number of their overall validations; | (2) | Identify the most performant clusters of validators; | (3) | Select % of out of the most performant cluster/s; | (4) | Select % of randomly out of the less performant cluster/s; | (5) | Create the list of validators , |
|