Fig. 6From: GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonationGraph histogram sequence creation. First, each of the windows of the transaction sequence is transformed into a graph composed of companies and accounts. Then the graphs are transformed into histograms using their connected subgraphsBack to article page