Fig. 13From: Blockchain-oriented approach for detecting cyber-attack transactionsResults of execution time on different window sizes of training data. The blue and red bars represent the execution time of EIF and WEIF, respectivelyBack to article page