Fig. 12From: Blockchain-oriented approach for detecting cyber-attack transactionsResults of F1 score with different window sizes of training dataBack to article page