Fig. 8From: Blockchain-oriented approach for detecting cyber-attack transactionsResults of correlation analysisBack to article page