Research Article

Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus

Figure 11

Tolerance against malicious validators (ratio 1 : 10).