Fig. 13From: GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonationPre-processing and feature engineering time for each window size. This time corresponds to the time taken to create the transaction sequence, the graphs and the histogramsBack to article page