Fig. 28
From: Secure IoT data dissemination with blockchain and transfer learning techniques

Triggering violation for storing malicious data feeds in the BC.
From: Secure IoT data dissemination with blockchain and transfer learning techniques

Triggering violation for storing malicious data feeds in the BC.