Skip to main content

Table 12 Algorithm of isolation tree (IF)

From: Blockchain-oriented approach for detecting cyber-attack transactions