Fig. 7From: Blockchain-oriented approach for detecting cyber-attack transactionsComparison of the depths processed by WEIF and EIF. The red and blue lines represent the depths computed by WEIF and EIF, respectivelyBack to article page