Fig. 2From: Detecting malicious accounts in permissionless blockchains using temporal graph propertiesSample blockchain temporal graphs and corresponding aggregated graphBack to article page