Fig. 3
From: Detecting malicious accounts in permissionless blockchains using temporal graph properties

Sample graph depicting the most attractive and least attractive accounts
From: Detecting malicious accounts in permissionless blockchains using temporal graph properties
Sample graph depicting the most attractive and least attractive accounts