Research Article

Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus

Figure 12

Tolerance against malicious validators (ratio 1 : 50).