Research Article

Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus

Figure 10

Tolerance against malicious validators (ratio 1 : 3).