Skip to main content

Table 5 Algorithm of weighted depth

From: Blockchain-oriented approach for detecting cyber-attack transactions