Skip to main content

Table 15 Algorithm of constructing isolation forest (EIF)

From: Blockchain-oriented approach for detecting cyber-attack transactions