Research Article

UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

Table 1

The input features of the FNN algorithm.

Input featuresDescription of the input features

Number of the target SW collaboratorsA collection of collaborators for the target SW, including collaborator identities. An integer representing the number of SW’s collaborators
Average trust value of SW collaboratorsA real number between 0 and 1, where 0 and 1 represent the honest collaborator and dishonest collaborator, respectively.
Number of SW’s conspiratorsAn integer representing the number of SW’s conspirators .
Current number of SW participating behaviorsThe latest uiv shared and statistical behavior characteristics, represented as a real number
Current number of SW rejected behaviorsThe latest uiv shared and statistical behavior characteristics, represented as a real number
Current number of SW leak behaviorsThe latest uiv shared and statistical behavior characteristics, represented as a real number
Current number of SW keep-secret behaviorsThe latest uiv shared and statistical behavior characteristics, represented as a real number
Number of SW historical participating behaviorsPrevious uiv shared and statistical behavior characteristics, represented as a real number
Number of SW historical rejected behaviorsPrevious uiv shared and statistical behavior characteristics, represented as a real number
Number of SW historical leak behaviorsPrevious uiv shared and statistical behavior characteristics, represented as a real number
Number of SW historical keep-secret behaviorsPrevious uiv shared and statistical behavior characteristics, represented as a real number