Skip to main content

Table 13 Algorithm of constructing isolation tree (EIF)

From: Blockchain-oriented approach for detecting cyber-attack transactions