Fig. 1
From: Detecting malicious accounts in permissionless blockchains using temporal graph properties

Overview of our methodology
From: Detecting malicious accounts in permissionless blockchains using temporal graph properties
Overview of our methodology