Fig. 2From: GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonationBehavior sequence creation The behavior sequence is created by partitioning the list of transactions issued bt C in the History dataset into sequential windows of size wsBack to article page