Fig. 1From: Blockchain-oriented approach for detecting cyber-attack transactionsThe framework of anomaly detection proposed in this workBack to article page