Skip to main content

Table 14 Algorithm of depth computation (EIF)

From: Blockchain-oriented approach for detecting cyber-attack transactions