Research Article

Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain

Figure 10

Comparison of (a) PMIR between mistreatment attack and GA-SVM and (b) PMR between MITM attack and GA-SVM.
(a)
(b)